, probability 0, space 0, times 0 [ 93.823509][ T5732] CPU: 0 PID: 5732 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 93.832176][ T5732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.842225][ T5732] Call Trace: [ 93.845575][ T5732] dump_stack+0x137/0x19d [ 93.849965][ T5732] should_fail+0x23c/0x250 [ 93.854405][ T5732] ? security_file_alloc+0x30/0x190 10:49:46 executing program 4: set_mempolicy(0x3, &(0x7f00000000c0)=0x7f, 0x6eea) r0 = fork() clone3(&(0x7f0000000240)={0x61b00100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r0], 0x1}, 0x58) set_mempolicy(0x4000, &(0x7f0000000000)=0x7, 0x1) set_mempolicy(0x4000, &(0x7f0000000040)=0x7f, 0xfffffffffffffffe) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000002) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x1000) [ 93.859598][ T5732] __should_failslab+0x81/0x90 [ 93.864385][ T5732] should_failslab+0x5/0x20 [ 93.868879][ T5732] kmem_cache_alloc+0x46/0x2f0 [ 93.873635][ T5732] security_file_alloc+0x30/0x190 [ 93.878702][ T5732] __alloc_file+0x83/0x1a0 [ 93.883106][ T5732] alloc_empty_file+0xcd/0x1c0 [ 93.887863][ T5732] path_openat+0x6a/0x20b0 [ 93.892265][ T5732] ? avc_has_perm_noaudit+0x19a/0x240 [ 93.897688][ T5732] ? avc_has_perm_noaudit+0x19a/0x240 [ 93.903105][ T5732] ? avc_has_perm+0x59/0x150 10:49:46 executing program 4: set_mempolicy(0x3, &(0x7f00000000c0)=0x7f, 0x6eea) r0 = fork() clone3(&(0x7f0000000240)={0x61b00100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r0], 0x1}, 0x58) set_mempolicy(0x4000, &(0x7f0000000000)=0x7, 0x1) set_mempolicy(0x4000, &(0x7f0000000040)=0x7f, 0xfffffffffffffffe) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000002) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x1000) [ 93.907687][ T5732] ? avc_has_perm+0xc8/0x150 [ 93.912274][ T5732] do_filp_open+0xd9/0x1f0 [ 93.916694][ T5732] ? __virt_addr_valid+0x15a/0x1a0 [ 93.921826][ T5732] ? __check_object_size+0x253/0x310 [ 93.927154][ T5732] ? _find_next_bit+0x16a/0x190 [ 93.931998][ T5732] ? alloc_fd+0x388/0x3e0 [ 93.936350][ T5732] do_sys_openat2+0xa3/0x250 [ 93.940975][ T5732] __x64_sys_openat+0xef/0x110 [ 93.945793][ T5732] do_syscall_64+0x4a/0x90 [ 93.950212][ T5732] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 93.956156][ T5732] RIP: 0033:0x4196c4 [ 93.960049][ T5732] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 93.979651][ T5732] RSP: 002b:00007ff1bf414e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 93.988055][ T5732] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 93.996017][ T5732] RDX: 0000000000000002 RSI: 00007ff1bf414f40 RDI: 00000000ffffff9c [ 94.004023][ T5732] RBP: 00007ff1bf414f40 R08: 0000000000000000 R09: 0000000000000000 [ 94.012081][ T5732] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 94.020039][ T5732] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 10:49:46 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) 10:49:46 executing program 4: set_mempolicy(0x3, &(0x7f00000000c0)=0x7f, 0x6eea) r0 = fork() clone3(&(0x7f0000000240)={0x61b00100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r0], 0x1}, 0x58) set_mempolicy(0x4000, &(0x7f0000000000)=0x7, 0x1) set_mempolicy(0x4000, &(0x7f0000000040)=0x7f, 0xfffffffffffffffe) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000002) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x1000) [ 94.172580][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 94.172630][ T25] audit: type=1326 audit(1624358986.978:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5779 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:49:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r3, 0xc94, 0xa9, 0x6) socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$BTRFS_IOC_WAIT_SYNC(r4, 0x40089416, &(0x7f00000001c0)) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r5, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:49:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6628, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:49:47 executing program 2 (fault-call:0 fault-nth:11): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:49:47 executing program 4: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000002d0604007ab37a37d43653b642803c28aa3b8a000000f8ffffffd6fffe0f03c79bb452e5f53dcb9b0d5c89f9fc563a7dd01697ec5234b26ece08cfe26757273864c7a2ba342500976773cf4ee65a151cfed351dcf50f7c560faf7aa609d7e7021c583335ef276300863693aa349ac7b4582c40966c12aefac28e076b3452a32e61a9b90caa2d4e76631b321edbd363ff9f7c106443d7d7707527f546772a5ae4394abf9660222c237a40a81c000000000000"], 0x14}}, 0x40085) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x100000002) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000900)={&(0x7f0000001480)=ANY=[@ANYBLOB="a0e000007c5360342b097d7ff5814b305280fb911fd8bffd867c15f4144fdb121258262708af28aaddb849dcf0f58811e5082c71c0619855adb3c71b221499d8df64c938603940d83e37c67e4b7a1fd5ed1c50f9e6947ad04656d6802d0f429094436b8d2a75aea4fd985328dd2f822c70608278a37b251089e41e370530c3", @ANYRES16=r2, @ANYBLOB="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"], 0x2a0}, 0x1, 0x0, 0x0, 0xd0ab36f7e537cde5}, 0x8800) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/147, 0x93}, {&(0x7f0000000b80)=""/53, 0x35}, {&(0x7f0000000bc0)=""/188, 0xbc}, {&(0x7f0000000c80)=""/103, 0x67}, {&(0x7f0000000d00)=""/140, 0x8c}, {&(0x7f0000000dc0)=""/246, 0xf6}, {&(0x7f0000000ec0)=""/149, 0x95}, {&(0x7f0000000f80)=""/116, 0x74}], 0x8, 0x0, 0x35add77a) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="7e6eb816b3873b22505dfc88cd625b21bfcf5cc212cbbdc69fccda7cac45f2bb8af82500e1ed894945b13b00fa3efb701e5d3548e321ed69872b5aac080202fe", @ANYRES16=r3, @ANYBLOB="00022bbd7000fedbdf25170000000c00990000000000150000000a00060008021100000000000a000600ffffffffffff00000a0006000802110000000000"], 0x44}}, 0xc11) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xd0, 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[], 0x208e24b) name_to_handle_at(r5, &(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)=@GFS2_LARGE_FH_SIZE={0x20, 0x8, {{0x9, 0x7ff, 0x6, 0x101}, {0xb2d, 0x0, 0x3, 0x4}}}, &(0x7f0000001100), 0x0) write$binfmt_script(r4, &(0x7f00000004c0)=ANY=[], 0x208e24b) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(r4, &(0x7f0000000a00)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x38, r7, 0x300, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7, 0x65}}}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0x7}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x8880) 10:49:47 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:49:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 94.432973][ T5800] FAULT_INJECTION: forcing a failure. [ 94.432973][ T5800] name failslab, interval 1, probability 0, space 0, times 0 [ 94.445608][ T5800] CPU: 0 PID: 5800 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 94.454267][ T5800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.464388][ T5800] Call Trace: [ 94.467643][ T5800] dump_stack+0x137/0x19d [ 94.472048][ T5800] should_fail+0x23c/0x250 [ 94.476474][ T5800] ? loop_set_status_from_info+0x3a0/0x3a0 [ 94.482258][ T5800] __should_failslab+0x81/0x90 [ 94.486995][ T5800] ? __kthread_create_on_node+0x7a/0x290 [ 94.492600][ T5800] should_failslab+0x5/0x20 [ 94.497123][ T5800] kmem_cache_alloc_trace+0x49/0x310 [ 94.502383][ T5800] ? loop_set_status_from_info+0x3a0/0x3a0 [ 94.508181][ T5800] __kthread_create_on_node+0x7a/0x290 [ 94.513615][ T5800] ? lo_open+0x93/0xa0 [ 94.517658][ T5800] ? __blkdev_get+0xc1/0x6d0 [ 94.522259][ T5800] ? loop_set_status_from_info+0x3a0/0x3a0 [ 94.528039][ T5800] kthread_create_on_node+0x72/0xa0 [ 94.533217][ T5800] loop_configure+0x597/0xcb0 [ 94.537879][ T5800] ? mntput+0x45/0x70 [ 94.541893][ T5800] lo_ioctl+0x555/0x11f0 [ 94.546123][ T5800] ? path_openat+0x19ab/0x20b0 [ 94.550953][ T5800] ? putname+0xa5/0xc0 [ 94.555016][ T5800] ? ___cache_free+0x3c/0x300 [ 94.559692][ T5800] ? blkdev_common_ioctl+0x9c3/0x1040 [ 94.565040][ T5800] ? selinux_file_ioctl+0x8e0/0x970 [ 94.570217][ T5800] ? lo_release+0x120/0x120 [ 94.574694][ T5800] blkdev_ioctl+0x1d0/0x3c0 [ 94.579180][ T5800] block_ioctl+0x6d/0x80 [ 94.583402][ T5800] ? blkdev_iopoll+0x70/0x70 [ 94.588150][ T5800] __se_sys_ioctl+0xcb/0x140 [ 94.592723][ T5800] __x64_sys_ioctl+0x3f/0x50 [ 94.597371][ T5800] do_syscall_64+0x4a/0x90 [ 94.601783][ T5800] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 94.607681][ T5800] RIP: 0033:0x466397 [ 94.611552][ T5800] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 94.631163][ T5800] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 94.639551][ T5800] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 94.647496][ T5800] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 94.655529][ T5800] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 94.663480][ T5800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 94.671495][ T5800] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 10:49:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 94.694118][ T25] audit: type=1326 audit(1624358987.498:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5798 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 94.721916][ T5795] loop4: detected capacity change from 0 to 264192 [ 94.734750][ T5795] EXT4-fs (loop4): Unrecognized mount option "nl80211" or missing value 10:49:47 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:49:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 94.743124][ T5795] EXT4-fs (loop4): failed to parse options in superblock: nl80211 [ 94.781193][ T5795] EXT4-fs (loop4): mounted filesystem without journal. Opts: nl80211; ,errors=continue. Quota mode: none. 10:49:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 94.822394][ T25] audit: type=1326 audit(1624358987.618:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5818 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 94.831926][ T5795] ext4 filesystem being mounted at /root/syzkaller-testdir781231432/syzkaller.FXQRdh/47/file0 supports timestamps until 2038 (0x7fffffff) 10:49:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {0x6}]}) 10:49:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 95.027487][ T25] audit: type=1326 audit(1624358987.828:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5839 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:49:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r3, 0xc94, 0xa9, 0x6) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:49:48 executing program 2 (fault-call:0 fault-nth:12): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:49:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:49:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 10:49:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000004c0)=ANY=[], 0x208e24b) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) set_mempolicy(0x2, &(0x7f0000000140)=0x8001, 0x3) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000004c0)=ANY=[], 0x208e24b) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000200), &(0x7f0000000240)=0x8) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="38010000100013070000000000000000fc020000000000000000000000000000fe8000000000000000000000000000bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000067980f2fc4e500000000000000000000000a000000000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x138}}, 0x0) sendfile(r4, r2, 0x0, 0x100000002) [ 95.303408][ T5861] FAULT_INJECTION: forcing a failure. [ 95.303408][ T5861] name failslab, interval 1, probability 0, space 0, times 0 [ 95.316276][ T5861] CPU: 1 PID: 5861 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 95.324953][ T5861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.335131][ T5861] Call Trace: [ 95.338409][ T5861] dump_stack+0x137/0x19d [ 95.342737][ T5861] should_fail+0x23c/0x250 [ 95.347140][ T5861] ? __kernfs_new_node+0x6a/0x330 [ 95.352164][ T5861] __should_failslab+0x81/0x90 [ 95.357008][ T5861] should_failslab+0x5/0x20 [ 95.361503][ T5861] kmem_cache_alloc+0x46/0x2f0 [ 95.366283][ T5861] ? kvm_sched_clock_read+0xd/0x20 [ 95.371390][ T5861] __kernfs_new_node+0x6a/0x330 [ 95.376241][ T5861] ? select_task_rq_fair+0x186/0xc00 [ 95.381527][ T5861] ? rb_insert_color+0x2fa/0x310 [ 95.386457][ T5861] kernfs_create_dir_ns+0x5e/0x140 [ 95.391642][ T5861] internal_create_group+0x138/0x850 [ 95.396937][ T5861] ? check_preempt_wakeup+0x22f/0x360 [ 95.402316][ T5861] sysfs_create_group+0x1b/0x20 [ 95.407250][ T5861] loop_configure+0xa21/0xcb0 [ 95.411930][ T5861] lo_ioctl+0x555/0x11f0 [ 95.416173][ T5861] ? path_openat+0x19ab/0x20b0 [ 95.420953][ T5861] ? putname+0xa5/0xc0 [ 95.425017][ T5861] ? ___cache_free+0x3c/0x300 [ 95.429697][ T5861] ? blkdev_common_ioctl+0x9c3/0x1040 [ 95.435073][ T5861] ? selinux_file_ioctl+0x8e0/0x970 [ 95.440265][ T5861] ? lo_release+0x120/0x120 [ 95.444826][ T5861] blkdev_ioctl+0x1d0/0x3c0 [ 95.449353][ T5861] block_ioctl+0x6d/0x80 [ 95.453611][ T5861] ? blkdev_iopoll+0x70/0x70 [ 95.458206][ T5861] __se_sys_ioctl+0xcb/0x140 [ 95.462838][ T5861] __x64_sys_ioctl+0x3f/0x50 [ 95.467491][ T5861] do_syscall_64+0x4a/0x90 [ 95.471900][ T5861] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 95.477788][ T5861] RIP: 0033:0x466397 [ 95.481677][ T5861] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 95.501273][ T5861] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 95.509752][ T5861] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 95.517717][ T5861] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 95.525690][ T5861] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 95.533661][ T5861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 95.541623][ T5861] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 10:49:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 10:49:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 95.549643][ T5861] loop2: detected capacity change from 0 to 1 [ 95.577965][ T5862] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.4'. 10:49:48 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:49:48 executing program 2 (fault-call:0 fault-nth:13): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:49:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 10:49:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 95.684130][ T25] audit: type=1326 audit(1624358988.488:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5886 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 95.708967][ T5889] FAULT_INJECTION: forcing a failure. [ 95.708967][ T5889] name failslab, interval 1, probability 0, space 0, times 0 [ 95.721622][ T5889] CPU: 1 PID: 5889 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 10:49:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) [ 95.730299][ T5889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.740366][ T5889] Call Trace: [ 95.743655][ T5889] dump_stack+0x137/0x19d [ 95.747986][ T5889] should_fail+0x23c/0x250 [ 95.752399][ T5889] ? radix_tree_node_alloc+0x154/0x1f0 [ 95.757854][ T5889] __should_failslab+0x81/0x90 [ 95.762615][ T5889] should_failslab+0x5/0x20 [ 95.767145][ T5889] kmem_cache_alloc+0x46/0x2f0 [ 95.772092][ T5889] ? kvm_sched_clock_read+0xd/0x20 [ 95.777312][ T5889] ? sched_clock_cpu+0x11/0x180 [ 95.782290][ T5889] radix_tree_node_alloc+0x154/0x1f0 [ 95.787561][ T5889] idr_get_free+0x22a/0x5d0 [ 95.792086][ T5889] idr_alloc_cyclic+0xe3/0x2d0 [ 95.796844][ T5889] ? __radix_tree_preload+0x16f/0x190 [ 95.802194][ T5889] __kernfs_new_node+0xb4/0x330 [ 95.807021][ T5889] ? select_task_rq_fair+0x186/0xc00 [ 95.812289][ T5889] ? rb_insert_color+0x7e/0x310 [ 95.817137][ T5889] kernfs_create_dir_ns+0x5e/0x140 [ 95.822223][ T5889] internal_create_group+0x138/0x850 [ 95.827630][ T5889] ? check_preempt_wakeup+0x1bb/0x360 [ 95.832988][ T5889] sysfs_create_group+0x1b/0x20 [ 95.837839][ T5889] loop_configure+0xa21/0xcb0 [ 95.842661][ T5889] lo_ioctl+0x555/0x11f0 [ 95.846880][ T5889] ? path_openat+0x19ab/0x20b0 [ 95.851633][ T5889] ? putname+0xa5/0xc0 [ 95.855693][ T5889] ? ___cache_free+0x3c/0x300 [ 95.860373][ T5889] ? blkdev_common_ioctl+0x9c3/0x1040 [ 95.865726][ T5889] ? selinux_file_ioctl+0x8e0/0x970 [ 95.870960][ T5889] ? lo_release+0x120/0x120 [ 95.875443][ T5889] blkdev_ioctl+0x1d0/0x3c0 [ 95.879923][ T5889] block_ioctl+0x6d/0x80 [ 95.884143][ T5889] ? blkdev_iopoll+0x70/0x70 [ 95.888708][ T5889] __se_sys_ioctl+0xcb/0x140 [ 95.893279][ T5889] __x64_sys_ioctl+0x3f/0x50 [ 95.897891][ T5889] do_syscall_64+0x4a/0x90 [ 95.902303][ T5889] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 95.908173][ T5889] RIP: 0033:0x466397 [ 95.912051][ T5889] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 95.931645][ T5889] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 95.940038][ T5889] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 95.948025][ T5889] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 95.956134][ T5889] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 95.964126][ T5889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 95.972183][ T5889] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 [ 95.981023][ T5889] loop2: detected capacity change from 0 to 1 10:49:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r3, 0xc94, 0xa9, 0x6) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:49:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) 10:49:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:49:48 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x4, 0x80, 0x1, 0x5, 0x0, 0x81, 0x0, 0x412a, 0x1, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x69e0, 0x1, @perf_config_ext={0xffff}, 0x10, 0x398, 0x7, 0x7, 0x8, 0x6, 0x6, 0x0, 0x6, 0x0, 0x8}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) unshare(0x60000600) 10:49:48 executing program 2 (fault-call:0 fault-nth:14): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 96.162005][ T5916] FAULT_INJECTION: forcing a failure. [ 96.162005][ T5916] name failslab, interval 1, probability 0, space 0, times 0 [ 96.174647][ T5916] CPU: 1 PID: 5916 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 96.183315][ T5916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.193369][ T5916] Call Trace: [ 96.196635][ T5916] dump_stack+0x137/0x19d [ 96.200997][ T5916] should_fail+0x23c/0x250 [ 96.205411][ T5916] ? __kernfs_new_node+0x6a/0x330 [ 96.210475][ T5916] __should_failslab+0x81/0x90 [ 96.215309][ T5916] should_failslab+0x5/0x20 [ 96.219803][ T5916] kmem_cache_alloc+0x46/0x2f0 [ 96.224588][ T5916] ? __cond_resched+0x11/0x40 [ 96.229362][ T5916] __kernfs_new_node+0x6a/0x330 [ 96.234219][ T5916] ? idr_alloc_cyclic+0x249/0x2d0 [ 96.239259][ T5916] ? rb_insert_color+0x7e/0x310 [ 96.244129][ T5916] kernfs_new_node+0x5b/0xd0 [ 96.248743][ T5916] __kernfs_create_file+0x45/0x1a0 [ 96.253842][ T5916] sysfs_add_file_mode_ns+0x1c1/0x250 [ 96.259205][ T5916] internal_create_group+0x2e4/0x850 [ 96.264543][ T5916] sysfs_create_group+0x1b/0x20 [ 96.269561][ T5916] loop_configure+0xa21/0xcb0 [ 96.274249][ T5916] lo_ioctl+0x555/0x11f0 [ 96.278494][ T5916] ? path_openat+0x19ab/0x20b0 [ 96.283249][ T5916] ? putname+0xa5/0xc0 [ 96.287328][ T5916] ? ___cache_free+0x3c/0x300 [ 96.292040][ T5916] ? blkdev_common_ioctl+0x9c3/0x1040 [ 96.297403][ T5916] ? selinux_file_ioctl+0x8e0/0x970 [ 96.302588][ T5916] ? lo_release+0x120/0x120 [ 96.307158][ T5916] blkdev_ioctl+0x1d0/0x3c0 10:49:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) [ 96.311696][ T5916] block_ioctl+0x6d/0x80 [ 96.315927][ T5916] ? blkdev_iopoll+0x70/0x70 [ 96.320762][ T5916] __se_sys_ioctl+0xcb/0x140 [ 96.325391][ T5916] __x64_sys_ioctl+0x3f/0x50 [ 96.330084][ T5916] do_syscall_64+0x4a/0x90 [ 96.334505][ T5916] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 96.340393][ T5916] RIP: 0033:0x466397 10:49:49 executing program 1: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 96.344339][ T5916] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 96.364037][ T5916] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 96.372464][ T5916] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 96.380439][ T5916] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 96.388499][ T5916] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 96.396525][ T5916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 96.404485][ T5916] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 [ 96.459163][ T5916] loop2: detected capacity change from 0 to 1 10:49:49 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:49:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}]}) 10:49:49 executing program 1: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:49:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r2, r1, 0x0, 0x100000002) ftruncate(r1, 0x3f) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) setns(r3, 0x80) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3a000000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="95ae6cfb8abd28ca8247252e0504b6c7ba489bcd6e71106204810669856f29ac9e4f5de4f8f94a7fd84f9858ea6c8f6f661059e5054402abc9cd8145653e6e36347066b1fced35d445becefd95059afbe3cf4c70996c4486c5a33d2a74eac22b7e83e7eb6425e5bcd80b62e5640e1b6ee3"]) 10:49:49 executing program 2 (fault-call:0 fault-nth:15): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 96.548628][ T25] audit: type=1326 audit(1624358989.348:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5946 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 96.556877][ T5953] FAULT_INJECTION: forcing a failure. [ 96.556877][ T5953] name failslab, interval 1, probability 0, space 0, times 0 [ 96.584616][ T5953] CPU: 1 PID: 5953 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 96.593289][ T5953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.593301][ T5953] Call Trace: [ 96.593307][ T5953] dump_stack+0x137/0x19d [ 96.593328][ T5953] should_fail+0x23c/0x250 [ 96.593342][ T5953] ? __kernfs_new_node+0x6a/0x330 [ 96.593359][ T5953] __should_failslab+0x81/0x90 [ 96.618596][ T5954] loop4: detected capacity change from 0 to 264192 [ 96.620458][ T5953] should_failslab+0x5/0x20 [ 96.620479][ T5953] kmem_cache_alloc+0x46/0x2f0 [ 96.626292][ T5954] EXT4-fs (loop4): Unrecognized mount option "l(ʂG%.ǺHnqbio)O]JOXlofYD́Ee>n64pf5ELplDţ=*t+~d% bdn" or missing value [ 96.631701][ T5953] __kernfs_new_node+0x6a/0x330 [ 96.631725][ T5953] ? __cond_resched+0x11/0x40 [ 96.631762][ T5953] ? mutex_lock+0x9/0x30 [ 96.631774][ T5953] kernfs_new_node+0x5b/0xd0 [ 96.677011][ T5953] __kernfs_create_file+0x45/0x1a0 [ 96.682144][ T5953] sysfs_add_file_mode_ns+0x1c1/0x250 [ 96.687609][ T5953] internal_create_group+0x2e4/0x850 [ 96.692955][ T5953] sysfs_create_group+0x1b/0x20 [ 96.697807][ T5953] loop_configure+0xa21/0xcb0 [ 96.702519][ T5953] lo_ioctl+0x555/0x11f0 [ 96.706866][ T5953] ? path_openat+0x19ab/0x20b0 [ 96.711618][ T5953] ? putname+0xa5/0xc0 [ 96.715670][ T5953] ? ___cache_free+0x3c/0x300 [ 96.720325][ T5953] ? blkdev_common_ioctl+0x9c3/0x1040 [ 96.725681][ T5953] ? selinux_file_ioctl+0x8e0/0x970 [ 96.730968][ T5953] ? lo_release+0x120/0x120 [ 96.735461][ T5953] blkdev_ioctl+0x1d0/0x3c0 [ 96.739946][ T5953] block_ioctl+0x6d/0x80 [ 96.744168][ T5953] ? blkdev_iopoll+0x70/0x70 [ 96.748749][ T5953] __se_sys_ioctl+0xcb/0x140 [ 96.753334][ T5953] __x64_sys_ioctl+0x3f/0x50 [ 96.757904][ T5953] do_syscall_64+0x4a/0x90 [ 96.762299][ T5953] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 96.768174][ T5953] RIP: 0033:0x466397 [ 96.772055][ T5953] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 96.791674][ T5953] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 96.800065][ T5953] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 96.808037][ T5953] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 96.815991][ T5953] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 96.823971][ T5953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 96.832542][ T5953] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 [ 96.840744][ T5953] loop2: detected capacity change from 0 to 1 10:49:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r3, 0xc94, 0xa9, 0x6) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:49:49 executing program 1: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:49:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}]}) 10:49:49 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x10, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/58, 0x3a}, {&(0x7f0000000280)=""/143, 0x8f}, {&(0x7f0000000340)=""/248, 0xf8}, {&(0x7f00000001c0)=""/26, 0x1a}, {&(0x7f0000000440)=""/95, 0x5f}], 0x5, 0x6, 0x4) write$cgroup_type(r1, &(0x7f0000000140), 0xffffff1f) 10:49:49 executing program 2 (fault-call:0 fault-nth:16): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 97.012965][ T5976] loop4: detected capacity change from 0 to 4096 [ 97.025727][ T5981] FAULT_INJECTION: forcing a failure. [ 97.025727][ T5981] name failslab, interval 1, probability 0, space 0, times 0 [ 97.027835][ T5976] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 97.038799][ T5981] CPU: 0 PID: 5981 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 97.058367][ T5981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.068414][ T5981] Call Trace: [ 97.071751][ T5981] dump_stack+0x137/0x19d [ 97.076080][ T5981] should_fail+0x23c/0x250 [ 97.080490][ T5981] ? __kernfs_new_node+0x6a/0x330 [ 97.085523][ T5981] __should_failslab+0x81/0x90 [ 97.090283][ T5981] should_failslab+0x5/0x20 [ 97.094787][ T5981] kmem_cache_alloc+0x46/0x2f0 [ 97.099585][ T5981] __kernfs_new_node+0x6a/0x330 [ 97.104604][ T5981] ? __cond_resched+0x11/0x40 [ 97.109271][ T5981] ? mutex_lock+0x9/0x30 10:49:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:49:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}]}) [ 97.113494][ T5981] kernfs_new_node+0x5b/0xd0 [ 97.118083][ T5981] __kernfs_create_file+0x45/0x1a0 [ 97.123272][ T5981] sysfs_add_file_mode_ns+0x1c1/0x250 [ 97.128752][ T5981] internal_create_group+0x2e4/0x850 [ 97.134046][ T5981] sysfs_create_group+0x1b/0x20 [ 97.138898][ T5981] loop_configure+0xa21/0xcb0 [ 97.143645][ T5981] lo_ioctl+0x555/0x11f0 [ 97.147884][ T5981] ? path_openat+0x19ab/0x20b0 [ 97.152715][ T5981] ? putname+0xa5/0xc0 [ 97.156844][ T5981] ? ___cache_free+0x3c/0x300 [ 97.161521][ T5981] ? blkdev_common_ioctl+0x9c3/0x1040 [ 97.166883][ T5981] ? selinux_file_ioctl+0x8e0/0x970 [ 97.172124][ T5981] ? lo_release+0x120/0x120 [ 97.176630][ T5981] blkdev_ioctl+0x1d0/0x3c0 [ 97.181207][ T5981] block_ioctl+0x6d/0x80 [ 97.185472][ T5981] ? blkdev_iopoll+0x70/0x70 [ 97.190106][ T5981] __se_sys_ioctl+0xcb/0x140 [ 97.194718][ T5981] __x64_sys_ioctl+0x3f/0x50 [ 97.199325][ T5981] do_syscall_64+0x4a/0x90 [ 97.203950][ T5981] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 97.209920][ T5981] RIP: 0033:0x466397 [ 97.213806][ T5981] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 97.233542][ T5981] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 97.241966][ T5981] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 97.249939][ T5981] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 97.258025][ T5981] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 97.266020][ T5981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 97.273976][ T5981] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 [ 97.283357][ T5981] loop2: detected capacity change from 0 to 1 10:49:50 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:49:50 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0xb2, 0x4, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x2000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x11, 0x400, 0x6, 0x6, 0x0, 0xac, 0x37, 0x0, 0xf1f7, 0x0, 0x3f}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 10:49:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:49:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {}]}) 10:49:50 executing program 2 (fault-call:0 fault-nth:17): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 97.418805][ T6013] FAULT_INJECTION: forcing a failure. [ 97.418805][ T6013] name failslab, interval 1, probability 0, space 0, times 0 [ 97.431489][ T6013] CPU: 0 PID: 6013 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 97.440237][ T6013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.450293][ T6013] Call Trace: [ 97.453561][ T6013] dump_stack+0x137/0x19d [ 97.457971][ T6013] should_fail+0x23c/0x250 [ 97.462482][ T6013] ? __kernfs_new_node+0x6a/0x330 [ 97.467505][ T6013] __should_failslab+0x81/0x90 [ 97.472297][ T6013] should_failslab+0x5/0x20 [ 97.476793][ T6013] kmem_cache_alloc+0x46/0x2f0 [ 97.481550][ T6013] __kernfs_new_node+0x6a/0x330 [ 97.486399][ T6013] ? __cond_resched+0x11/0x40 [ 97.491140][ T6013] ? mutex_lock+0x9/0x30 [ 97.495384][ T6013] kernfs_new_node+0x5b/0xd0 [ 97.499992][ T6013] __kernfs_create_file+0x45/0x1a0 [ 97.505104][ T6013] sysfs_add_file_mode_ns+0x1c1/0x250 [ 97.510563][ T6013] internal_create_group+0x2e4/0x850 [ 97.515923][ T6013] sysfs_create_group+0x1b/0x20 [ 97.520816][ T6013] loop_configure+0xa21/0xcb0 [ 97.525709][ T6013] lo_ioctl+0x555/0x11f0 [ 97.530208][ T6013] ? path_openat+0x19ab/0x20b0 [ 97.535066][ T6013] ? putname+0xa5/0xc0 [ 97.539176][ T6013] ? ___cache_free+0x3c/0x300 [ 97.543961][ T6013] ? blkdev_common_ioctl+0x9c3/0x1040 [ 97.549436][ T6013] ? selinux_file_ioctl+0x8e0/0x970 [ 97.554681][ T6013] ? lo_release+0x120/0x120 [ 97.559198][ T6013] blkdev_ioctl+0x1d0/0x3c0 [ 97.563685][ T6013] block_ioctl+0x6d/0x80 [ 97.567942][ T6013] ? blkdev_iopoll+0x70/0x70 [ 97.572515][ T6013] __se_sys_ioctl+0xcb/0x140 [ 97.577163][ T6013] __x64_sys_ioctl+0x3f/0x50 [ 97.581733][ T6013] do_syscall_64+0x4a/0x90 [ 97.586152][ T6013] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 97.592027][ T6013] RIP: 0033:0x466397 [ 97.595921][ T6013] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 97.615606][ T6013] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 97.623997][ T6013] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 97.632070][ T6013] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 97.640057][ T6013] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 97.648165][ T6013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 97.656172][ T6013] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 [ 97.667651][ T6013] loop2: detected capacity change from 0 to 1 [ 97.708100][ T6029] PM: suspend entry (deep) [ 97.720772][ T6029] Filesystems sync: 0.008 seconds [ 97.725995][ T6029] Freezing user space processes ... [ 117.743403][ T6029] Freezing of tasks failed after 20.009 seconds (1 tasks refusing to freeze, wq_busy=0): [ 117.753458][ T6029] task:syz-executor.4 state:D stack:13808 pid: 5302 ppid: 1766 flags:0x00004004 [ 117.762773][ T6029] Call Trace: [ 117.766038][ T6029] __schedule+0x41f/0x5b0 [ 117.770348][ T6029] ? prepare_to_wait_event+0x13f/0x190 [ 117.775799][ T6029] schedule+0x67/0x90 [ 117.779757][ T6029] p9_client_rpc+0x254/0x630 [ 117.784358][ T6029] ? add_wait_queue+0x48/0xa0 [ 117.789026][ T6029] ? init_wait_entry+0x30/0x30 [ 117.793802][ T6029] p9_client_version+0x8e/0x300 [ 117.798635][ T6029] ? p9_fd_create+0x1d1/0x1e0 [ 117.803300][ T6029] p9_client_create+0x601/0x6f0 [ 117.808152][ T6029] ? __kmalloc_track_caller+0x23b/0x340 [ 117.813686][ T6029] v9fs_session_init+0x100/0xcf0 [ 117.818625][ T6029] ? __next_zones_zonelist+0x4f/0x90 [ 117.823914][ T6029] ? kmem_cache_alloc_trace+0x215/0x310 [ 117.829448][ T6029] ? v9fs_mount+0x41/0x4c0 [ 117.833854][ T6029] v9fs_mount+0x57/0x4c0 [ 117.838071][ T6029] ? selinux_capable+0x34/0x40 [ 117.842825][ T6029] ? tsan.module_ctor+0x10/0x10 [ 117.847646][ T6029] legacy_get_tree+0x70/0xc0 [ 117.852250][ T6029] vfs_get_tree+0x4a/0x1a0 [ 117.856814][ T6029] path_mount+0x11d4/0x1ce0 [ 117.861354][ T6029] __se_sys_mount+0x23d/0x2e0 [ 117.866009][ T6029] ? __fpregs_load_activate+0x8f/0x1b0 [ 117.871483][ T6029] __x64_sys_mount+0x63/0x70 [ 117.876070][ T6029] do_syscall_64+0x4a/0x90 [ 117.880477][ T6029] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.886358][ T6029] RIP: 0033:0x4665d9 [ 117.890241][ T6029] RSP: 002b:00007ff36b600188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 117.898639][ T6029] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 117.906630][ T6029] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 0000000000000000 [ 117.914610][ T6029] RBP: 00000000004bfcb9 R08: 0000000020000140 R09: 0000000000000000 [ 117.922568][ T6029] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 117.930519][ T6029] R13: 00007fffa4b407cf R14: 00007ff36b600300 R15: 0000000000022000 10:50:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r3, 0xc94, 0xa9, 0x6) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:10 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:10 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x100000002) openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x208e24b) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r3, r0, 0x0, 0x100000002) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="200027bd7000fbdbdf25770000000c009900010001006e00e27b18ecee9ce2ec0fae"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x10, r1, 0x0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r8, 0x9, 0x128, 0xf0b, 0x30}) 10:50:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {}]}) 10:50:10 executing program 2 (fault-call:0 fault-nth:18): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 117.938508][ T6029] [ 117.940807][ T6029] OOM killer enabled. [ 117.944761][ T6029] Restarting tasks ... done. [ 117.950979][ T6029] PM: suspend exit 10:50:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:10 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 118.002819][ T6038] FAULT_INJECTION: forcing a failure. [ 118.002819][ T6038] name failslab, interval 1, probability 0, space 0, times 0 [ 118.015709][ T6038] CPU: 0 PID: 6038 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 118.024398][ T6038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.034636][ T6038] Call Trace: [ 118.037916][ T6038] dump_stack+0x137/0x19d [ 118.042244][ T6038] should_fail+0x23c/0x250 [ 118.046702][ T6038] ? __kernfs_new_node+0x6a/0x330 10:50:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x801, 0x5) r1 = socket$netlink(0x10, 0x3, 0xa) sendfile(r1, r0, 0x0, 0x401ffc000) 10:50:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {}]}) 10:50:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 118.051728][ T6038] __should_failslab+0x81/0x90 [ 118.056550][ T6038] should_failslab+0x5/0x20 [ 118.061064][ T6038] kmem_cache_alloc+0x46/0x2f0 [ 118.065831][ T6038] __kernfs_new_node+0x6a/0x330 [ 118.070705][ T6038] ? __cond_resched+0x11/0x40 [ 118.075373][ T6038] ? mutex_lock+0x9/0x30 [ 118.079616][ T6038] kernfs_new_node+0x5b/0xd0 [ 118.084200][ T6038] __kernfs_create_file+0x45/0x1a0 [ 118.089419][ T6038] sysfs_add_file_mode_ns+0x1c1/0x250 [ 118.094795][ T6038] internal_create_group+0x2e4/0x850 10:50:10 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 118.100085][ T6038] sysfs_create_group+0x1b/0x20 [ 118.104984][ T6038] loop_configure+0xa21/0xcb0 [ 118.109656][ T6038] lo_ioctl+0x555/0x11f0 [ 118.113909][ T6038] ? path_openat+0x19ab/0x20b0 [ 118.118840][ T6038] ? putname+0xa5/0xc0 [ 118.122917][ T6038] ? ___cache_free+0x3c/0x300 [ 118.127596][ T6038] ? blkdev_common_ioctl+0x9c3/0x1040 [ 118.132987][ T6038] ? selinux_file_ioctl+0x8e0/0x970 [ 118.138180][ T6038] ? lo_release+0x120/0x120 [ 118.142689][ T6038] blkdev_ioctl+0x1d0/0x3c0 [ 118.147264][ T6038] block_ioctl+0x6d/0x80 [ 118.151568][ T6038] ? blkdev_iopoll+0x70/0x70 [ 118.156184][ T6038] __se_sys_ioctl+0xcb/0x140 [ 118.160816][ T6038] __x64_sys_ioctl+0x3f/0x50 [ 118.165427][ T6038] do_syscall_64+0x4a/0x90 [ 118.169902][ T6038] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 118.175928][ T6038] RIP: 0033:0x466397 [ 118.179808][ T6038] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.199569][ T6038] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 118.207979][ T6038] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 118.215942][ T6038] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 118.224048][ T6038] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 118.232046][ T6038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 118.240017][ T6038] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 [ 118.255611][ T6038] loop2: detected capacity change from 0 to 1 10:50:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r3, 0xc94, 0xa9, 0x6) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:11 executing program 4: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)={0x913, 0x1005, 0x81, 0x12d7}) 10:50:11 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x6}]}) 10:50:11 executing program 2 (fault-call:0 fault-nth:19): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x6}]}) 10:50:11 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:11 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f00000002c0)="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", 0x1000}], 0x1, 0x3) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x100000002) sendmsg$unix(r3, &(0x7f0000000200)={&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000012c0)="8f37f307c10d53edfe880a56e44fdb184d20f51fbeba3f56809828d33d695494fb4df7bf4f017b092b528723ab210f3dbba0c0d5c0ff9c5058e603c1235c6c942b027447693cda4fd7eb9c1dd0b9c0be4091fc31a6c5da02c1f37af434c972a5f61c479aae3275142bea2a8ff3bd2b4a9d431b9cdc28d26633fd3195fc11c9defbfca3c51c24873548c3b846bf2dd1f7080fabda2641f0097e683b8592bc49d46ddb5d9a5e701db34c6f580975d11115da3547b9ba01729ef933e76feb07c7c976616572", 0xc4}, {&(0x7f00000013c0)="27f7baad51501c2c504d557a6f6fa760838574ab8b5537e3e67e546ce7c24f1e4b8f84f60bf5c87cce771d8f1bef278ecd74ecd4089e2637b7aaea0fd3299af7e9ec0b246bf09f0c4dbbb6db25484c139faabd959b8913a698a4d57c979553a5647fa1b5d62805aee743b5a782fcb0c20d37f4c84adaf8865a9893946b7a4c39a602f308cb289a67ce6d30db94c2cb1004996b55f0c8b6d1616d1ecd64ca18ccda26345e21672f3af0fc4eef49eaf25a70fe0b1631404efe604e", 0xba}, {&(0x7f0000001480)="bfeb406dffe73f11081c316a91d923ff374e5fa087b375db56222e8103a3e791d38ea1322ad547e40910ce8b2f36c434c96a6bec541989f74b5f801d90c913f4a47a2da3617f4f6fc756280dfc1743224383ff5464f370149891a5ff9b0a077a9a7e2259f687da37caca90beec68da8d7900fb05b7fe643d70d1aec54c722c014fa548c2a0244077183b86ae2250b4d5e0d30da7510e55df80d1d97c70fc970b68da6053d5ac4bdc67b1772056f39d69f68a67f4e1be6172a43f72fda400b4c54cc2fbf429cfb6e55a5eedbb71ab77ed1c5e0b56ca04d3012b235ff705", 0xdd}, {&(0x7f0000001580)="a116b80f8ca4c23a3fa4cf1f82633d8c1e096f4d724e079c8bbcc3353ef40e3e4a66fc86c2862ec153508cb9010e5388dc5c3b995402a8626e74b05c6c06218c3c129d368b23d1459417e06f12ffd48e57ad906225a5c97bae7cb5c4a777d172663f7f97d67ea87cb476a91e60ac65ef1c76e061a093144b819134230aa0dc5f46cbb848181c392f426988ad0e47e42dbc8b88a0c1310d6cf4139efe99", 0x9d}], 0x4, 0x0, 0x0, 0x4c090}, 0x40004) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x5, 0x4) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}, 0x22}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) [ 118.881464][ T6093] FAULT_INJECTION: forcing a failure. [ 118.881464][ T6093] name failslab, interval 1, probability 0, space 0, times 0 [ 118.894105][ T6093] CPU: 0 PID: 6093 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 118.902777][ T6093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.912829][ T6093] Call Trace: [ 118.916193][ T6093] dump_stack+0x137/0x19d [ 118.920552][ T6093] should_fail+0x23c/0x250 [ 118.924975][ T6093] ? __kernfs_new_node+0x6a/0x330 [ 118.930004][ T6093] __should_failslab+0x81/0x90 [ 118.935286][ T6093] should_failslab+0x5/0x20 [ 118.939774][ T6093] kmem_cache_alloc+0x46/0x2f0 [ 118.944561][ T6093] __kernfs_new_node+0x6a/0x330 [ 118.949459][ T6093] ? __cond_resched+0x11/0x40 [ 118.954314][ T6093] ? mutex_lock+0x9/0x30 [ 118.958555][ T6093] kernfs_new_node+0x5b/0xd0 [ 118.963154][ T6093] __kernfs_create_file+0x45/0x1a0 [ 118.968279][ T6093] sysfs_add_file_mode_ns+0x1c1/0x250 [ 118.973655][ T6093] internal_create_group+0x2e4/0x850 10:50:11 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x6}]}) [ 118.978973][ T6093] sysfs_create_group+0x1b/0x20 [ 118.984018][ T6093] loop_configure+0xa21/0xcb0 [ 118.988695][ T6093] lo_ioctl+0x555/0x11f0 [ 118.993026][ T6093] ? path_openat+0x19ab/0x20b0 [ 118.997886][ T6093] ? putname+0xa5/0xc0 [ 119.001950][ T6093] ? ___cache_free+0x3c/0x300 [ 119.006626][ T6093] ? blkdev_common_ioctl+0x9c3/0x1040 [ 119.011986][ T6093] ? selinux_file_ioctl+0x8e0/0x970 [ 119.017177][ T6093] ? lo_release+0x120/0x120 [ 119.018084][ T6109] SELinux: security_context_str_to_sid(unconfined_urootcontext=system_u,) failed for (dev tmpfs, type tmpfs) errno=-22 [ 119.021676][ T6093] blkdev_ioctl+0x1d0/0x3c0 [ 119.021696][ T6093] block_ioctl+0x6d/0x80 [ 119.021713][ T6093] ? blkdev_iopoll+0x70/0x70 [ 119.021745][ T6093] __se_sys_ioctl+0xcb/0x140 [ 119.021761][ T6093] __x64_sys_ioctl+0x3f/0x50 [ 119.056627][ T6093] do_syscall_64+0x4a/0x90 [ 119.061059][ T6093] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 119.066949][ T6093] RIP: 0033:0x466397 [ 119.070829][ T6093] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.090432][ T6093] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 119.098915][ T6093] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 119.105906][ T6114] SELinux: security_context_str_to_sid(unconfined_urootcontext=system_u,) failed for (dev tmpfs, type tmpfs) errno=-22 [ 119.106961][ T6093] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 119.106973][ T6093] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 119.135946][ T6093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 119.144017][ T6093] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 [ 119.155122][ T6093] loop2: detected capacity change from 0 to 1 10:50:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r3, 0xc94, 0xa9, 0x6) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:12 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = syz_open_procfs(r1, &(0x7f0000000180)='net/udp\x00') vmsplice(r3, &(0x7f00000002c0), 0x0, 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r2, r4) open(&(0x7f00000002c0)='./file0\x00', 0x5010c0, 0x100) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="20000000000006006a005f0073797a3000000000c2da60b814d5f778d7ca573b200ee91a331ba3ecda8f6fe1fed8540c921698a6817ea0871448f862ee6fc4a138711aade1877fe9b5b662cd213f4b4de63c73f4fefad3e0c36eeeee272530a139a407ebe5760aef0d73337b8ad009b9d9aa244c967aced415023d8c5dced1fdd6431e8c489ae3584d1637a2e11499fc66794e8de0639fa72488b69684c731abe86db21397c0bb64c1af7da3ecb0e9cab2d7f79c288924db5de4e0"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:50:12 executing program 2 (fault-call:0 fault-nth:20): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:12 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 119.716346][ T6143] loop2: detected capacity change from 0 to 1 [ 119.727977][ T6143] FAULT_INJECTION: forcing a failure. [ 119.727977][ T6143] name failslab, interval 1, probability 0, space 0, times 0 [ 119.740640][ T6143] CPU: 0 PID: 6143 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 119.749361][ T6143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.759566][ T6143] Call Trace: [ 119.762827][ T6143] dump_stack+0x137/0x19d [ 119.767158][ T6143] should_fail+0x23c/0x250 [ 119.771570][ T6143] __should_failslab+0x81/0x90 [ 119.776330][ T6143] ? kobject_uevent_env+0x1a7/0xc40 [ 119.781580][ T6143] should_failslab+0x5/0x20 [ 119.786065][ T6143] kmem_cache_alloc_trace+0x49/0x310 [ 119.791424][ T6143] ? dev_uevent_filter+0x70/0x70 [ 119.796378][ T6143] kobject_uevent_env+0x1a7/0xc40 [ 119.801451][ T6143] kobject_uevent+0x18/0x20 [ 119.805937][ T6143] loop_configure+0xb3c/0xcb0 [ 119.810595][ T6143] lo_ioctl+0x555/0x11f0 [ 119.814825][ T6143] ? path_openat+0x19ab/0x20b0 [ 119.819575][ T6143] ? putname+0xa5/0xc0 [ 119.823692][ T6143] ? ___cache_free+0x3c/0x300 [ 119.828395][ T6143] ? blkdev_common_ioctl+0x9c3/0x1040 [ 119.833823][ T6143] ? selinux_file_ioctl+0x8e0/0x970 [ 119.839003][ T6143] ? lo_release+0x120/0x120 [ 119.843489][ T6143] blkdev_ioctl+0x1d0/0x3c0 [ 119.847972][ T6143] block_ioctl+0x6d/0x80 [ 119.852192][ T6143] ? blkdev_iopoll+0x70/0x70 [ 119.856760][ T6143] __se_sys_ioctl+0xcb/0x140 [ 119.861367][ T6143] __x64_sys_ioctl+0x3f/0x50 [ 119.866035][ T6143] do_syscall_64+0x4a/0x90 [ 119.870471][ T6143] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 119.876421][ T6143] RIP: 0033:0x466397 [ 119.880294][ T6143] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.899880][ T6143] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 119.908273][ T6143] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 10:50:12 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 119.916298][ T6143] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 119.924249][ T6143] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 119.932199][ T6143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 119.940148][ T6143] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 10:50:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) 10:50:12 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 119.964447][ T6156] loop4: detected capacity change from 0 to 264192 [ 119.969544][ T25] audit: type=1326 audit(1624359012.766:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 119.994557][ T6156] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 120.002406][ T6156] EXT4-fs (loop4): failed to parse options in superblock:  10:50:12 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 120.041058][ T25] audit: type=1326 audit(1624359012.846:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6170 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 120.064761][ T6156] EXT4-fs (loop4): mounted filesystem without journal. Opts: ; ,errors=continue. Quota mode: none. [ 120.075697][ T6156] ext4 filesystem being mounted at /root/syzkaller-testdir781231432/syzkaller.FXQRdh/57/file0 supports timestamps until 2038 (0x7fffffff) 10:50:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r3, 0xc94, 0xa9, 0x6) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) 10:50:13 executing program 2 (fault-call:0 fault-nth:21): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = syz_open_procfs(r1, &(0x7f0000000180)='net/udp\x00') vmsplice(r3, &(0x7f00000002c0), 0x0, 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r2, r4) open(&(0x7f00000002c0)='./file0\x00', 0x5010c0, 0x100) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="20000000000006006a005f0073797a3000000000c2da60b814d5f778d7ca573b200ee91a331ba3ecda8f6fe1fed8540c921698a6817ea0871448f862ee6fc4a138711aade1877fe9b5b662cd213f4b4de63c73f4fefad3e0c36eeeee272530a139a407ebe5760aef0d73337b8ad009b9d9aa244c967aced415023d8c5dced1fdd6431e8c489ae3584d1637a2e11499fc66794e8de0639fa72488b69684c731abe86db21397c0bb64c1af7da3ecb0e9cab2d7f79c288924db5de4e0"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:50:13 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = syz_open_procfs(r1, &(0x7f0000000180)='net/udp\x00') vmsplice(r3, &(0x7f00000002c0), 0x0, 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r2, r4) open(&(0x7f00000002c0)='./file0\x00', 0x5010c0, 0x100) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="20000000000006006a005f0073797a3000000000c2da60b814d5f778d7ca573b200ee91a331ba3ecda8f6fe1fed8540c921698a6817ea0871448f862ee6fc4a138711aade1877fe9b5b662cd213f4b4de63c73f4fefad3e0c36eeeee272530a139a407ebe5760aef0d73337b8ad009b9d9aa244c967aced415023d8c5dced1fdd6431e8c489ae3584d1637a2e11499fc66794e8de0639fa72488b69684c731abe86db21397c0bb64c1af7da3ecb0e9cab2d7f79c288924db5de4e0"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:50:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:13 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = syz_open_procfs(r1, &(0x7f0000000180)='net/udp\x00') vmsplice(r3, &(0x7f00000002c0), 0x0, 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r2, r4) open(&(0x7f00000002c0)='./file0\x00', 0x5010c0, 0x100) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="20000000000006006a005f0073797a3000000000c2da60b814d5f778d7ca573b200ee91a331ba3ecda8f6fe1fed8540c921698a6817ea0871448f862ee6fc4a138711aade1877fe9b5b662cd213f4b4de63c73f4fefad3e0c36eeeee272530a139a407ebe5760aef0d73337b8ad009b9d9aa244c967aced415023d8c5dced1fdd6431e8c489ae3584d1637a2e11499fc66794e8de0639fa72488b69684c731abe86db21397c0bb64c1af7da3ecb0e9cab2d7f79c288924db5de4e0"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:50:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) [ 120.581461][ T25] audit: type=1326 audit(1624359013.386:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6195 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 120.618594][ T6205] loop2: detected capacity change from 0 to 1 10:50:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 120.647672][ T6205] FAULT_INJECTION: forcing a failure. [ 120.647672][ T6205] name failslab, interval 1, probability 0, space 0, times 0 [ 120.660320][ T6205] CPU: 0 PID: 6205 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 120.669055][ T6205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.679192][ T6205] Call Trace: [ 120.682460][ T6205] dump_stack+0x137/0x19d [ 120.686786][ T6205] should_fail+0x23c/0x250 [ 120.691194][ T6205] ? kzalloc+0x1d/0x30 [ 120.695268][ T6205] __should_failslab+0x81/0x90 [ 120.700019][ T6205] should_failslab+0x5/0x20 [ 120.704540][ T6205] __kmalloc+0x66/0x340 [ 120.708680][ T6205] kzalloc+0x1d/0x30 [ 120.712566][ T6205] kobject_get_path+0x7c/0x110 [ 120.717339][ T6205] kobject_uevent_env+0x1be/0xc40 [ 120.722350][ T6205] kobject_uevent+0x18/0x20 [ 120.726941][ T6205] loop_configure+0xb3c/0xcb0 [ 120.731628][ T6205] lo_ioctl+0x555/0x11f0 [ 120.736115][ T6205] ? path_openat+0x19ab/0x20b0 [ 120.740866][ T6205] ? putname+0xa5/0xc0 [ 120.744976][ T6205] ? ___cache_free+0x3c/0x300 [ 120.749638][ T6205] ? blkdev_common_ioctl+0x9c3/0x1040 [ 120.754996][ T6205] ? selinux_file_ioctl+0x8e0/0x970 [ 120.760179][ T6205] ? lo_release+0x120/0x120 [ 120.764691][ T6205] blkdev_ioctl+0x1d0/0x3c0 [ 120.769221][ T6205] block_ioctl+0x6d/0x80 [ 120.773469][ T6205] ? blkdev_iopoll+0x70/0x70 [ 120.778087][ T6205] __se_sys_ioctl+0xcb/0x140 [ 120.782742][ T6205] __x64_sys_ioctl+0x3f/0x50 [ 120.787378][ T6205] do_syscall_64+0x4a/0x90 [ 120.791839][ T6205] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 120.797752][ T6205] RIP: 0033:0x466397 [ 120.801688][ T6205] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 120.821343][ T6205] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 120.829731][ T6205] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 120.837712][ T6205] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 120.845669][ T6205] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 120.853633][ T6205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 120.861580][ T6205] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 [ 120.923100][ T25] audit: type=1326 audit(1624359013.727:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6218 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:14 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:14 executing program 4: keyctl$session_to_parent(0x12) io_setup(0x8, &(0x7f00000000c0)=0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e40)=ANY=[], 0x1378) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) socket$nl_audit(0x10, 0x3, 0x9) open(&(0x7f0000000080)='./bus\x00', 0x1, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x100000002) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[], 0x208e24b) r6 = open_tree(r5, &(0x7f0000000240)='./bus\x00', 0x9000) r7 = open(&(0x7f00000004c0)='./bus\x00', 0x84400, 0xc) io_submit(r0, 0x5, &(0x7f0000000540)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000100)="c6c834f0a4333568dfe60065532ba67912d6ef3916f08702eab51456b9523087c4e1044fae62984eb2cba04b25626ca1cee5946db9e4db15bf7c7fef957ec356c8ca15ea985e81243982682520c10b0347bbea7d401a7448ca81100f174be497b1ece47d8c85807f4f21a1ef7d77c5e930a992d5d2df7b0f06833e957f5e419609b9621da713624ad8dfd0def0cb0cd45c5ecd1f71598c937d6a600648c172b8a91f1620421eda9c4f388f8c91b4078e72c270680d8b8185b5d9255fd4952d50ebdd502b359527b65ddd7ad422ba47b168c85c60ac99f295d42af76aa2f5816511d9971ee4fe3bcd08810cd4f393bb", 0xef, 0x5, 0x0, 0x1, r5}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000200)="64cbada699c29775b4c1049db3828b435d697606a5823444b6ebb27e188761832ad7cac0b30427de3fade741", 0x2c, 0x2, 0x0, 0x1, r6}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x2, 0x7, r6, &(0x7f00000002c0)="6abe3a92e4d94ce2b54f8bcb3a95028bb2eddabbfdfae022ecdfe100ec1490baeef57e41edb5c3efc94644979a007f07098a5cc9e4b9ecc5a414774137c8726c0d8b508b6515288581f5b86b80c8db57784d060204221db3ca6902ff3aa22f", 0x5f, 0x8, 0x0, 0x1, r2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x8000, r1, &(0x7f0000000380)="8837b3f0286235227bac13412a71127d77ec36ddb856698e1cc5380e1e2ae7adf1feea0340dcaff21672835ae4ea0f767307181c06f5e1d57eb2f0984b74db8d67e6e1168ecb7dc0", 0x48, 0x10000, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x6, r3, &(0x7f0000000480), 0xffffffffffffff50, 0x7fffffff, 0x0, 0x0, r7}]) 10:50:14 executing program 2 (fault-call:0 fault-nth:22): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:14 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 121.437226][ T25] audit: type=1326 audit(1624359014.237:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6240 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 121.470516][ T6248] loop2: detected capacity change from 0 to 1 [ 121.476680][ T6248] FAULT_INJECTION: forcing a failure. 10:50:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:14 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 121.476680][ T6248] name failslab, interval 1, probability 0, space 0, times 0 [ 121.489295][ T6248] CPU: 1 PID: 6248 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 121.497983][ T6248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.508119][ T6248] Call Trace: [ 121.511571][ T6248] dump_stack+0x137/0x19d [ 121.515913][ T6248] should_fail+0x23c/0x250 [ 121.520380][ T6248] __should_failslab+0x81/0x90 [ 121.525144][ T6248] should_failslab+0x5/0x20 [ 121.529660][ T6248] kmem_cache_alloc_node+0x58/0x2b0 [ 121.534859][ T6248] ? __alloc_skb+0xed/0x420 [ 121.539415][ T6248] __alloc_skb+0xed/0x420 [ 121.543730][ T6248] alloc_uevent_skb+0x5b/0x120 [ 121.548533][ T6248] kobject_uevent_env+0x863/0xc40 [ 121.553547][ T6248] kobject_uevent+0x18/0x20 [ 121.558081][ T6248] loop_configure+0xb3c/0xcb0 [ 121.562760][ T6248] lo_ioctl+0x555/0x11f0 [ 121.567020][ T6248] ? path_openat+0x19ab/0x20b0 [ 121.571762][ T6248] ? putname+0xa5/0xc0 [ 121.575813][ T6248] ? ___cache_free+0x3c/0x300 [ 121.580502][ T6248] ? blkdev_common_ioctl+0x9c3/0x1040 [ 121.585869][ T6248] ? selinux_file_ioctl+0x8e0/0x970 [ 121.591054][ T6248] ? lo_release+0x120/0x120 [ 121.595535][ T6248] blkdev_ioctl+0x1d0/0x3c0 [ 121.600043][ T6248] block_ioctl+0x6d/0x80 [ 121.604271][ T6248] ? blkdev_iopoll+0x70/0x70 [ 121.608858][ T6248] __se_sys_ioctl+0xcb/0x140 [ 121.613497][ T6248] __x64_sys_ioctl+0x3f/0x50 [ 121.618071][ T6248] do_syscall_64+0x4a/0x90 [ 121.622469][ T6248] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.628368][ T6248] RIP: 0033:0x466397 [ 121.632271][ T6248] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.651859][ T6248] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 121.660252][ T6248] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 121.668289][ T6248] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 121.676240][ T6248] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 10:50:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:14 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 121.684192][ T6248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 121.692269][ T6248] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 [ 121.753859][ T25] audit: type=1326 audit(1624359014.557:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6258 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:15 executing program 4: clone(0x71060b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) write$sndseq(r0, &(0x7f0000000100)=[{0x1, 0x3, 0x97, 0x1, @tick=0x7, {0x1, 0x20}, {0x8, 0x64}, @quote={{0xca, 0x5e}}}, {0x7, 0x7f, 0x1, 0x6, @time={0x400, 0x2}, {0xec, 0x2}, {0x80, 0x1}, @connect={{0x1f, 0x71}, {0x5a}}}, {0x2, 0x5, 0x98, 0x0, @time={0x88ea, 0x3}, {0x8, 0x8a}, {0x0, 0x4}, @ext={0xf5, &(0x7f0000000000)="ef3c3a195346fd629b0a444619cf218b3e8eba7fee19ae356693b8cd7869a73f918cbbd50e35b21dae0451eeacbde8c2dd5a84e1b17b6847cbcfed61ea01750837b3800db140e6a2111ddd0bb7428b02ea4e4dbbaa7217de9b63a6ff6bc65cbf8115dc0af4fab9501df59d20fbb001ce61a0b47eae77b13d9c391b7c93227f183f18ba23cb1b185238af4072536d8ef9a2aedbea5ab886da72955d9e5d51170edb815e65fe792090ef3d77dd9c4ac426c1f1b5a1ae93e8a7069fd062e2cd5d9745ae1e92e1d726624061cf2ed999d1ff802cf0ec742e651b30b33e7c4b18a50b77d638010868fe2d183f9d2284449b341d5b050c25"}}, {0x5, 0x1, 0x1, 0x80, @time={0x4, 0x4}, {0x5, 0x40}, {0x1, 0x43}, @queue={0x3, {0x6}}}, {0x2, 0x4, 0x7f, 0x7f, @tick=0x7, {0x7, 0x1}, {0x1, 0x6}, @queue={0x1f, {0xfffffff9, 0xfffffffd}}}], 0x8c) tkill(0x0, 0x1c) tkill(0xffffffffffffffff, 0x22) 10:50:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:15 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:15 executing program 2 (fault-call:0 fault-nth:23): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 122.310697][ T25] audit: type=1326 audit(1624359015.117:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6289 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 122.334772][ T6295] loop2: detected capacity change from 0 to 1 [ 122.341459][ T6295] FAULT_INJECTION: forcing a failure. [ 122.341459][ T6295] name failslab, interval 1, probability 0, space 0, times 0 10:50:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 122.354093][ T6295] CPU: 1 PID: 6295 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 122.362757][ T6295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.372807][ T6295] Call Trace: [ 122.376090][ T6295] dump_stack+0x137/0x19d [ 122.379643][ T25] audit: type=1326 audit(1624359015.137:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6290 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 122.380429][ T6295] should_fail+0x23c/0x250 10:50:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 122.408091][ T6295] __should_failslab+0x81/0x90 [ 122.412933][ T6295] should_failslab+0x5/0x20 [ 122.417478][ T6295] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 122.423187][ T6295] ? __kmalloc_node_track_caller+0x30/0x40 [ 122.429052][ T6295] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 122.434499][ T6295] __kmalloc_node_track_caller+0x30/0x40 [ 122.440344][ T6295] ? alloc_uevent_skb+0x5b/0x120 [ 122.445285][ T6295] __alloc_skb+0x187/0x420 [ 122.449704][ T6295] alloc_uevent_skb+0x5b/0x120 [ 122.454469][ T6295] kobject_uevent_env+0x863/0xc40 10:50:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 122.459486][ T6295] kobject_uevent+0x18/0x20 [ 122.464070][ T6295] loop_configure+0xb3c/0xcb0 [ 122.468738][ T6295] lo_ioctl+0x555/0x11f0 [ 122.472979][ T6295] ? path_openat+0x19ab/0x20b0 [ 122.477739][ T6295] ? putname+0xa5/0xc0 [ 122.481847][ T6295] ? ___cache_free+0x3c/0x300 [ 122.486602][ T6295] ? blkdev_common_ioctl+0x9c3/0x1040 [ 122.491997][ T6295] ? selinux_file_ioctl+0x8e0/0x970 [ 122.511426][ T6295] ? lo_release+0x120/0x120 [ 122.515927][ T6295] blkdev_ioctl+0x1d0/0x3c0 [ 122.520475][ T6295] block_ioctl+0x6d/0x80 [ 122.524763][ T6295] ? blkdev_iopoll+0x70/0x70 [ 122.529382][ T6295] __se_sys_ioctl+0xcb/0x140 [ 122.533965][ T6295] __x64_sys_ioctl+0x3f/0x50 [ 122.538648][ T6295] do_syscall_64+0x4a/0x90 [ 122.543053][ T6295] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 122.548985][ T6295] RIP: 0033:0x466397 [ 122.552871][ T6295] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 122.572505][ T6295] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 122.580959][ T6295] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 122.588918][ T6295] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 122.596885][ T6295] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 10:50:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) 10:50:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 122.604855][ T6295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 122.612885][ T6295] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 10:50:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 122.676345][ T25] audit: type=1326 audit(1624359015.477:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6316 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:15 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000), 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000004c0)=ANY=[], 0x208e24b) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000000)='-\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ppoll(0x0, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 10:50:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) 10:50:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7f, 0x9, 0x9, 0x1f, 0x2, 0x5, 0x284d, 0x3b4, 0x40, 0x19a, 0x200, 0x5, 0x38, 0x1, 0x7ff4, 0x6, 0x7fff}, [{0x3, 0x1, 0x7383, 0x8, 0xf6cf, 0xfff, 0xffffffffffffff00, 0x3}], "28c5dff37627ef9208dbe68a0590507bf340c1c970e5fb1cb40de9c4188c"}, 0x96) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:15 executing program 2 (fault-call:0 fault-nth:24): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:15 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 123.191384][ T25] audit: type=1326 audit(1624359015.998:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6336 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 123.221709][ T6342] loop2: detected capacity change from 0 to 1 [ 123.231829][ T6342] FAULT_INJECTION: forcing a failure. [ 123.231829][ T6342] name failslab, interval 1, probability 0, space 0, times 0 [ 123.244471][ T6342] CPU: 1 PID: 6342 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 123.253920][ T6342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.264230][ T6342] Call Trace: [ 123.267494][ T6342] dump_stack+0x137/0x19d [ 123.271976][ T6342] should_fail+0x23c/0x250 [ 123.276383][ T6342] ? skb_clone+0x12c/0x1f0 [ 123.280813][ T6342] __should_failslab+0x81/0x90 [ 123.285633][ T6342] should_failslab+0x5/0x20 [ 123.290118][ T6342] kmem_cache_alloc+0x46/0x2f0 [ 123.294896][ T6342] skb_clone+0x12c/0x1f0 [ 123.299183][ T6342] netlink_broadcast_filtered+0x50d/0xb90 [ 123.304912][ T6342] ? skb_put+0xb9/0xf0 [ 123.308979][ T6342] netlink_broadcast+0x35/0x50 [ 123.313770][ T6342] kobject_uevent_env+0x8c9/0xc40 [ 123.318825][ T6342] kobject_uevent+0x18/0x20 [ 123.323446][ T6342] loop_configure+0xb3c/0xcb0 [ 123.328107][ T6342] lo_ioctl+0x555/0x11f0 [ 123.332424][ T6342] ? path_openat+0x19ab/0x20b0 [ 123.337178][ T6342] ? putname+0xa5/0xc0 [ 123.341226][ T6342] ? ___cache_free+0x3c/0x300 [ 123.345937][ T6342] ? blkdev_common_ioctl+0x9c3/0x1040 [ 123.351336][ T6342] ? selinux_file_ioctl+0x8e0/0x970 [ 123.356527][ T6342] ? lo_release+0x120/0x120 [ 123.361007][ T6342] blkdev_ioctl+0x1d0/0x3c0 [ 123.365565][ T6342] block_ioctl+0x6d/0x80 [ 123.369786][ T6342] ? blkdev_iopoll+0x70/0x70 [ 123.374373][ T6342] __se_sys_ioctl+0xcb/0x140 [ 123.379011][ T6342] __x64_sys_ioctl+0x3f/0x50 [ 123.383584][ T6342] do_syscall_64+0x4a/0x90 [ 123.387989][ T6342] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 123.393864][ T6342] RIP: 0033:0x466397 [ 123.397853][ T6342] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.417528][ T6342] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 123.425938][ T6342] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 123.433900][ T6342] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 10:50:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) 10:50:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 123.441862][ T6342] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 123.449843][ T6342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 123.457793][ T6342] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 10:50:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1}, {}, {0x6}]}) 10:50:16 executing program 2 (fault-call:0 fault-nth:25): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 123.596805][ T6374] loop2: detected capacity change from 0 to 1 [ 123.607440][ T6374] FAULT_INJECTION: forcing a failure. [ 123.607440][ T6374] name failslab, interval 1, probability 0, space 0, times 0 [ 123.620061][ T6374] CPU: 0 PID: 6374 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 123.628747][ T6374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.638775][ T6374] Call Trace: [ 123.642032][ T6374] dump_stack+0x137/0x19d [ 123.646380][ T6374] should_fail+0x23c/0x250 [ 123.650792][ T6374] __should_failslab+0x81/0x90 [ 123.655577][ T6374] ? call_usermodehelper_setup+0x81/0x160 [ 123.661351][ T6374] should_failslab+0x5/0x20 [ 123.665851][ T6374] kmem_cache_alloc_trace+0x49/0x310 [ 123.671255][ T6374] ? add_uevent_var+0x16e/0x1c0 [ 123.676107][ T6374] ? __kfree_skb+0xfe/0x150 [ 123.680624][ T6374] call_usermodehelper_setup+0x81/0x160 [ 123.686168][ T6374] ? add_uevent_var+0x1c0/0x1c0 [ 123.691060][ T6374] kobject_uevent_env+0xb29/0xc40 [ 123.696086][ T6374] kobject_uevent+0x18/0x20 [ 123.700650][ T6374] loop_configure+0xb3c/0xcb0 [ 123.705324][ T6374] lo_ioctl+0x555/0x11f0 [ 123.709634][ T6374] ? path_openat+0x19ab/0x20b0 [ 123.714389][ T6374] ? putname+0xa5/0xc0 [ 123.718453][ T6374] ? ___cache_free+0x3c/0x300 [ 123.723125][ T6374] ? blkdev_common_ioctl+0x9c3/0x1040 [ 123.728493][ T6374] ? selinux_file_ioctl+0x8e0/0x970 [ 123.733769][ T6374] ? lo_release+0x120/0x120 [ 123.738299][ T6374] blkdev_ioctl+0x1d0/0x3c0 [ 123.742801][ T6374] block_ioctl+0x6d/0x80 [ 123.747039][ T6374] ? blkdev_iopoll+0x70/0x70 [ 123.751672][ T6374] __se_sys_ioctl+0xcb/0x140 [ 123.756314][ T6374] __x64_sys_ioctl+0x3f/0x50 [ 123.760939][ T6374] do_syscall_64+0x4a/0x90 [ 123.765431][ T6374] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 123.771315][ T6374] RIP: 0033:0x466397 [ 123.775193][ T6374] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.794793][ T6374] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 123.803221][ T6374] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 123.811332][ T6374] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 123.819280][ T6374] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 123.827315][ T6374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 123.835263][ T6374] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 10:50:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1}, {}, {0x6}]}) 10:50:16 executing program 2 (fault-call:0 fault-nth:26): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000040)=0x3, 0x28) [ 124.054395][ T6397] loop2: detected capacity change from 0 to 1 [ 124.069734][ T6397] FAULT_INJECTION: forcing a failure. [ 124.069734][ T6397] name failslab, interval 1, probability 0, space 0, times 0 [ 124.082376][ T6397] CPU: 0 PID: 6397 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 124.091049][ T6397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.101095][ T6397] Call Trace: [ 124.104365][ T6397] dump_stack+0x137/0x19d [ 124.108732][ T6397] should_fail+0x23c/0x250 [ 124.113765][ T6397] __should_failslab+0x81/0x90 [ 124.118560][ T6397] ? call_usermodehelper_setup+0x81/0x160 [ 124.124308][ T6397] should_failslab+0x5/0x20 [ 124.128797][ T6397] kmem_cache_alloc_trace+0x49/0x310 [ 124.134068][ T6397] ? add_uevent_var+0x16e/0x1c0 [ 124.138986][ T6397] ? __kfree_skb+0xfe/0x150 [ 124.143470][ T6397] call_usermodehelper_setup+0x81/0x160 [ 124.149043][ T6397] ? add_uevent_var+0x1c0/0x1c0 [ 124.153918][ T6397] kobject_uevent_env+0xb29/0xc40 [ 124.158939][ T6397] kobject_uevent+0x18/0x20 [ 124.163437][ T6397] loop_configure+0xb3c/0xcb0 [ 124.168163][ T6397] lo_ioctl+0x555/0x11f0 [ 124.172397][ T6397] ? path_openat+0x19ab/0x20b0 [ 124.177227][ T6397] ? putname+0xa5/0xc0 [ 124.181278][ T6397] ? ___cache_free+0x3c/0x300 [ 124.185942][ T6397] ? blkdev_common_ioctl+0x9c3/0x1040 [ 124.191378][ T6397] ? selinux_file_ioctl+0x8e0/0x970 [ 124.196558][ T6397] ? lo_release+0x120/0x120 [ 124.201110][ T6397] blkdev_ioctl+0x1d0/0x3c0 [ 124.205670][ T6397] block_ioctl+0x6d/0x80 [ 124.209937][ T6397] ? blkdev_iopoll+0x70/0x70 [ 124.214533][ T6397] __se_sys_ioctl+0xcb/0x140 [ 124.219125][ T6397] __x64_sys_ioctl+0x3f/0x50 [ 124.223699][ T6397] do_syscall_64+0x4a/0x90 [ 124.228120][ T6397] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.234003][ T6397] RIP: 0033:0x466397 [ 124.237878][ T6397] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.259556][ T6397] RSP: 002b:00007ff1bf414e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 124.268015][ T6397] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 124.275988][ T6397] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 124.283965][ T6397] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 124.291914][ T6397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 10:50:16 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1}, {}, {0x6}]}) 10:50:17 executing program 4: syz_read_part_table(0x4, 0x2, &(0x7f0000000180)=[{&(0x7f0000000000)="d0e79aced921c0a90030c0f816418ad3f962503efc0ab86b8d58281566b63265a65d463940e5e3244569df2535125963dcd280a5812b7863d850bce63af4df562b2b670f4ac04d58e3e1d91401bf228010a429e6efff633709510c6f5d135f2507f2a95ad98069d9681e669bead60eb4ed9d", 0x72, 0x9e21}, {&(0x7f0000000080)="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", 0xfb, 0x100000000}]) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='scalable\x00', 0x9) [ 124.299906][ T6397] R13: 0000000000000004 R14: 0000000020000018 R15: 0000000000000001 10:50:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:17 executing program 5 (fault-call:0 fault-nth:0): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 124.332702][ T6418] loop4: detected capacity change from 0 to 264192 10:50:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 124.379437][ T6427] FAULT_INJECTION: forcing a failure. [ 124.379437][ T6427] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 124.392751][ T6427] CPU: 0 PID: 6427 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 124.401420][ T6427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.411456][ T6427] Call Trace: [ 124.414721][ T6427] dump_stack+0x137/0x19d [ 124.419049][ T6427] should_fail+0x23c/0x250 [ 124.423469][ T6427] should_fail_usercopy+0x16/0x20 [ 124.428530][ T6427] _copy_from_user+0x1c/0xd0 [ 124.433118][ T6427] do_seccomp+0x360/0x1530 [ 124.437533][ T6427] ? __cond_resched+0x11/0x40 [ 124.442203][ T6427] ? fput+0x2d/0x130 [ 124.446077][ T6427] ? ksys_write+0x157/0x180 [ 124.450651][ T6427] ? fpregs_assert_state_consistent+0x7d/0x90 [ 124.456776][ T6427] __x64_sys_seccomp+0x3c/0x50 [ 124.461534][ T6427] do_syscall_64+0x4a/0x90 [ 124.465948][ T6427] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.472017][ T6427] RIP: 0033:0x4665d9 [ 124.475892][ T6427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.495570][ T6427] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 124.504055][ T6427] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 124.512090][ T6427] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 124.520040][ T6427] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 124.527999][ T6427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 124.535952][ T6427] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 [ 124.559071][ T6418] loop4: detected capacity change from 0 to 264192 10:50:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x4) 10:50:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:17 executing program 2 (fault-call:0 fault-nth:27): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:17 executing program 5 (fault-call:0 fault-nth:1): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:17 executing program 4: msgget$private(0x0, 0x10) sync() r0 = msgget(0x0, 0x82) r1 = getgid() r2 = msgget(0x0, 0x40) msgrcv(r2, &(0x7f0000000080)={0x0, ""/157}, 0xa5, 0x0, 0x1000) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x100, 0x800, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = getpid() r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r7) sendmsg$netlink(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r7}}}], 0x20}, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000280)='./file0\x00', 0xf3, 0x6, &(0x7f00000015c0)=[{&(0x7f00000002c0)="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", 0x1000, 0x210000000}, {&(0x7f00000012c0)="66b17ea55029c04d76dc5f6b7dd567daec543a562f5462fe32623b9b3ea89367bd0a0931ea7da73fd8f712ec53fe74f08409005b49119b21e969aab52fef30d8e3fb5a5595c5aead9a87194ee179809aaef8ab77cfb03515439a492f135122ed6004662d719c6b3fc1d82b84862ee3f30722d949bef32c0d8fac39dc35563933c02d9f1d0efb90152b8a88c733de9685198c5736be935959680e9ff378ef6443e0c96d8d54fbcd3a13fa6d", 0xab, 0x3ff}, {&(0x7f0000001380)="a4c3f05b95abce95feb39a48f9a4b5eae5ea415227ce5ca0bebcd1d93859c1db49f75cca9dafc38cefe4acf82a66b5ffde9f91700bc89a1ea5de502de8822812814c4325dc153cd407da687db943c0b66218fbd67dcfd3cfb6d52012108041ff5198d32d4a6f0abce6ce00845d570a5f36351941d1a9dbf17c65cd5268aa221b416c09f7d44e6e37e1d1e4471577eba26abedf0df0c281155dc7bdeb6cdc946c7f4bcb110d39a60b", 0xa8, 0x4}, {&(0x7f0000001440)="c66ac045d887adff0e01daf0d08850a0643569ef8815f99228292972dbc8c8c07a9d7d6582333ea7f1bfb4d23c73fa28d948d90e38ae05ec34696df134eabadfec38f1018f5bccd163cf42085150d7e3fbf1d60aecbd300693ec06", 0x5b, 0x40}, {&(0x7f00000014c0)="9250be82ef4f828c299a407741a7979ae3bc56a17570c2538b40a0a10435931c62a625cc9d0c56a09fe0180d55fb1f54b5d54cceb8d00aaaad850621912d989eb2e12551773d30e0057b944b903c1dbd59cb8ffa", 0x54, 0x3}, {&(0x7f0000001540)="f50ad9ae4af86dddb1ee0d07bff9fdcf78c3e553ea328f00966762d9e1a524c29143b0646a33356e9350e0cc75dea709c7cca800b1ad2e6fe95ccebd73239cea82e495409941ed6ca423e1a6b8", 0x4d, 0xfff}], 0x8480, &(0x7f00000017c0)={[{@gid={'gid', 0x3d, r3}}, {@huge_never}, {@gid={'gid', 0x3d, r7}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x39, 0x70, 0x74, 0x6d, 0x31, 0x2d]}}, {@huge_always}, {@size={'size', 0x3d, [0x13, 0x35, 0x70, 0x70]}}], [{@euid_lt}]}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x0, 0xee00, r7, r9, r1, 0x30, 0x7ff}, 0x0, 0x0, 0x1, 0x0, 0x20, 0x6, 0x80000001, 0x5, 0xff80, 0xabc4, 0xffffffffffffffff, 0xffffffffffffffff}) [ 124.907657][ T6449] loop2: detected capacity change from 0 to 1 [ 124.915262][ T6449] FAULT_INJECTION: forcing a failure. [ 124.915262][ T6449] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 124.921063][ T6456] FAULT_INJECTION: forcing a failure. [ 124.921063][ T6456] name failslab, interval 1, probability 0, space 0, times 0 [ 124.928401][ T6449] CPU: 0 PID: 6449 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 124.949672][ T6449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.959763][ T6449] Call Trace: [ 124.963025][ T6449] dump_stack+0x137/0x19d [ 124.967361][ T6449] should_fail+0x23c/0x250 [ 124.971767][ T6449] should_fail_usercopy+0x16/0x20 [ 124.976797][ T6449] _copy_from_user+0x1c/0xd0 [ 124.981366][ T6449] lo_ioctl+0x3d5/0x11f0 [ 124.985603][ T6449] ? path_openat+0x19ab/0x20b0 [ 124.990365][ T6449] ? avc_has_extended_perms+0x5d8/0x7b0 [ 124.995947][ T6449] ? putname+0xa5/0xc0 [ 125.000014][ T6449] ? ___cache_free+0x3c/0x300 [ 125.004752][ T6449] ? blkdev_common_ioctl+0x9c3/0x1040 [ 125.010638][ T6449] ? selinux_file_ioctl+0x8e0/0x970 [ 125.015828][ T6449] ? lo_release+0x120/0x120 [ 125.020328][ T6449] blkdev_ioctl+0x1d0/0x3c0 [ 125.024833][ T6449] block_ioctl+0x6d/0x80 [ 125.029118][ T6449] ? blkdev_iopoll+0x70/0x70 [ 125.033744][ T6449] __se_sys_ioctl+0xcb/0x140 [ 125.038339][ T6449] __x64_sys_ioctl+0x3f/0x50 [ 125.042918][ T6449] do_syscall_64+0x4a/0x90 [ 125.047327][ T6449] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.053244][ T6449] RIP: 0033:0x466397 [ 125.057138][ T6449] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.076846][ T6449] RSP: 002b:00007ff1bf414ef8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 125.085272][ T6449] RAX: ffffffffffffffda RBX: 00007ff1bf414f40 RCX: 0000000000466397 [ 125.093301][ T6449] RDX: 00007ff1bf415050 RSI: 0000000000004c04 RDI: 0000000000000005 [ 125.101269][ T6449] RBP: 00007ff1bf4151d0 R08: 0000000000000000 R09: 0000000000000000 [ 125.109222][ T6449] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ff1bf415050 [ 125.117204][ T6449] R13: 00007ffcea8e1ebf R14: 00007ff1bf415300 R15: 0000000000022000 [ 125.125160][ T6456] CPU: 1 PID: 6456 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 125.133848][ T6456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.143902][ T6456] Call Trace: [ 125.147352][ T6456] dump_stack+0x137/0x19d [ 125.151660][ T6456] should_fail+0x23c/0x250 [ 125.156073][ T6456] __should_failslab+0x81/0x90 [ 125.160889][ T6456] ? do_seccomp+0x56d/0x1530 [ 125.165476][ T6456] should_failslab+0x5/0x20 [ 125.169957][ T6456] kmem_cache_alloc_trace+0x49/0x310 [ 125.175237][ T6456] do_seccomp+0x56d/0x1530 [ 125.179629][ T6456] ? __cond_resched+0x11/0x40 [ 125.184312][ T6456] ? fput+0x2d/0x130 [ 125.188202][ T6456] ? ksys_write+0x157/0x180 [ 125.192706][ T6456] __x64_sys_seccomp+0x3c/0x50 [ 125.197472][ T6456] do_syscall_64+0x4a/0x90 [ 125.201875][ T6456] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.207817][ T6456] RIP: 0033:0x4665d9 [ 125.211699][ T6456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.231289][ T6456] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 125.239817][ T6456] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 125.247896][ T6456] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 10:50:18 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 125.255976][ T6456] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 125.263933][ T6456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 125.271888][ T6456] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 10:50:18 executing program 5 (fault-call:0 fault-nth:2): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:18 executing program 2 (fault-call:0 fault-nth:28): syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 125.327942][ T25] kauditd_printk_skb: 6 callbacks suppressed [ 125.327951][ T25] audit: type=1326 audit(1624359018.128:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6461 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 125.339567][ T6471] FAULT_INJECTION: forcing a failure. [ 125.339567][ T6471] name failslab, interval 1, probability 0, space 0, times 0 [ 125.369941][ T6471] CPU: 0 PID: 6471 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 125.378663][ T6471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.388717][ T6471] Call Trace: [ 125.391982][ T6471] dump_stack+0x137/0x19d [ 125.393606][ T6475] loop4: detected capacity change from 0 to 258048 [ 125.396330][ T6471] should_fail+0x23c/0x250 [ 125.396349][ T6471] __should_failslab+0x81/0x90 [ 125.403025][ T6476] loop2: detected capacity change from 0 to 1 [ 125.407216][ T6471] should_failslab+0x5/0x20 [ 125.407233][ T6471] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 125.416419][ T6475] tmpfs: Bad value for 'nr_inodes' [ 125.418191][ T6471] ? try_charge+0x36/0x9c0 [ 125.418211][ T6471] ? __get_vm_area_node+0x11b/0x260 [ 125.443064][ T6471] __get_vm_area_node+0x11b/0x260 [ 125.448119][ T6471] __vmalloc_node_range+0xc2/0x5b0 [ 125.453283][ T6471] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 125.458810][ T6471] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 125.464335][ T6471] __vmalloc+0x5a/0x70 [ 125.468403][ T6471] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 125.473999][ T6471] bpf_prog_alloc_no_stats+0x33/0x1f0 [ 125.479528][ T6471] bpf_prog_alloc+0x16/0xe0 [ 125.484008][ T6471] bpf_prog_create_from_user+0x6f/0x240 [ 125.489532][ T6471] ? seccomp_run_filters+0x2b0/0x2b0 [ 125.494866][ T6471] do_seccomp+0x5b1/0x1530 [ 125.499258][ T6471] ? __cond_resched+0x11/0x40 [ 125.503963][ T6471] ? fput+0x2d/0x130 [ 125.507938][ T6471] ? ksys_write+0x157/0x180 [ 125.512475][ T6471] __x64_sys_seccomp+0x3c/0x50 [ 125.517240][ T6471] do_syscall_64+0x4a/0x90 [ 125.521651][ T6471] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.527605][ T6471] RIP: 0033:0x4665d9 [ 125.531478][ T6471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.551071][ T6471] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 125.559503][ T6471] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 125.567469][ T6471] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 125.575424][ T6471] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 125.583377][ T6471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 125.591447][ T6471] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 [ 125.599431][ T6471] syz-executor.5: vmalloc size 4096 allocation failure: vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 125.616648][ T6471] CPU: 0 PID: 6471 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 125.625306][ T6471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.635450][ T6471] Call Trace: [ 125.638712][ T6471] dump_stack+0x137/0x19d [ 125.643103][ T6471] warn_alloc+0x105/0x160 [ 125.647584][ T6471] __vmalloc_node_range+0x222/0x5b0 [ 125.652849][ T6471] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 125.658399][ T6471] __vmalloc+0x5a/0x70 [ 125.662447][ T6471] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 125.667972][ T6471] bpf_prog_alloc_no_stats+0x33/0x1f0 [ 125.673339][ T6471] bpf_prog_alloc+0x16/0xe0 [ 125.677828][ T6471] bpf_prog_create_from_user+0x6f/0x240 [ 125.683455][ T6471] ? seccomp_run_filters+0x2b0/0x2b0 [ 125.688833][ T6471] do_seccomp+0x5b1/0x1530 [ 125.693275][ T6471] ? __cond_resched+0x11/0x40 [ 125.698054][ T6471] ? fput+0x2d/0x130 [ 125.701927][ T6471] ? ksys_write+0x157/0x180 [ 125.706405][ T6471] __x64_sys_seccomp+0x3c/0x50 [ 125.711253][ T6471] do_syscall_64+0x4a/0x90 [ 125.715733][ T6471] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.721664][ T6471] RIP: 0033:0x4665d9 [ 125.725544][ T6471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.745413][ T6471] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 125.753870][ T6471] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 125.761841][ T6471] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 125.769797][ T6471] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 125.777791][ T6471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 125.785765][ T6471] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 [ 125.793783][ T6471] Mem-Info: [ 125.796887][ T6471] active_anon:59 inactive_anon:78305 isolated_anon:0 [ 125.796887][ T6471] active_file:5194 inactive_file:22263 isolated_file:0 [ 125.796887][ T6471] unevictable:0 dirty:8 writeback:14 [ 125.796887][ T6471] slab_reclaimable:3714 slab_unreclaimable:5530 [ 125.796887][ T6471] mapped:60195 shmem:2614 pagetables:1330 bounce:0 [ 125.796887][ T6471] free:1851175 free_pcp:523 free_cma:0 [ 125.833964][ T6471] Node 0 active_anon:236kB inactive_anon:313220kB active_file:20776kB inactive_file:89168kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:240780kB dirty:32kB writeback:0kB shmem:10456kB writeback_tmp:0kB kernel_stack:2048kB pagetables:5320kB all_unreclaimable? no [ 125.860374][ T6471] Node 0 DMA free:15360kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 125.886290][ T6471] lowmem_reserve[]: 0 2938 7916 7916 [ 125.891642][ T6471] Node 0 DMA32 free:3013472kB min:4220kB low:7228kB high:10236kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:3013524kB mlocked:0kB bounce:0kB free_pcp:52kB local_pcp:52kB free_cma:0kB [ 125.919200][ T6471] lowmem_reserve[]: 0 0 4978 4978 [ 125.924295][ T6471] Node 0 Normal free:4375868kB min:7152kB low:12248kB high:17344kB reserved_highatomic:0KB active_anon:236kB inactive_anon:312756kB active_file:20776kB inactive_file:89516kB unevictable:0kB writepending:0kB present:5242880kB managed:5098252kB mlocked:0kB bounce:0kB free_pcp:2084kB local_pcp:1100kB free_cma:0kB [ 125.953653][ T6471] lowmem_reserve[]: 0 0 0 0 [ 125.958181][ T6471] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 125.970838][ T6471] Node 0 DMA32: 4*4kB (M) 2*8kB (M) 4*16kB (M) 4*32kB (M) 6*64kB (M) 4*128kB (M) 5*256kB (M) 5*512kB (M) 4*1024kB (M) 1*2048kB (M) 733*4096kB (M) = 3013472kB [ 125.987063][ T6471] Node 0 Normal: 293*4kB (ME) 315*8kB (UME) 261*16kB (UME) 182*32kB (UME) 97*64kB (UME) 81*128kB (UM) 45*256kB (UM) 29*512kB (UM) 8*1024kB (UM) 3*2048kB (M) 1051*4096kB (ME) = 4375868kB [ 126.005778][ T6471] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 126.015066][ T6471] 16639 total pagecache pages [ 126.019750][ T6471] 0 pages in swap cache [ 126.023885][ T6471] Swap cache stats: add 0, delete 0, find 0/0 10:50:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x4) 10:50:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, 0x0, 0x0, 0x0, 0x0) 10:50:18 executing program 5 (fault-call:0 fault-nth:3): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, 0x0, 0x0, 0x0, 0x0) [ 126.030015][ T6471] Free swap = 0kB [ 126.033720][ T6471] Total swap = 0kB [ 126.037426][ T6471] 2097051 pages RAM [ 126.041334][ T6471] 0 pages HighMem/MovableOnly [ 126.046249][ T6471] 65267 pages reserved [ 126.095650][ T6476] FAULT_INJECTION: forcing a failure. [ 126.095650][ T6476] name failslab, interval 1, probability 0, space 0, times 0 [ 126.108377][ T6476] CPU: 1 PID: 6476 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 126.117065][ T6476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.127143][ T6476] Call Trace: [ 126.130507][ T6476] dump_stack+0x137/0x19d [ 126.132715][ T6503] FAULT_INJECTION: forcing a failure. [ 126.132715][ T6503] name failslab, interval 1, probability 0, space 0, times 0 [ 126.134870][ T6476] should_fail+0x23c/0x250 [ 126.134892][ T6476] __should_failslab+0x81/0x90 [ 126.156633][ T6476] should_failslab+0x5/0x20 [ 126.161135][ T6476] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 126.166887][ T6476] ? __get_vm_area_node+0x11b/0x260 [ 126.172071][ T6476] __get_vm_area_node+0x11b/0x260 [ 126.177126][ T6476] __vmalloc_node_range+0xc2/0x5b0 [ 126.184526][ T6476] ? blk_add_partitions+0x136/0xa80 [ 126.189803][ T6476] ? blk_add_partitions+0x136/0xa80 [ 126.195005][ T6476] vzalloc+0x5a/0x70 [ 126.198884][ T6476] ? blk_add_partitions+0x136/0xa80 [ 126.204068][ T6476] blk_add_partitions+0x136/0xa80 [ 126.209125][ T6476] bdev_disk_changed+0x2d3/0x340 [ 126.214136][ T6476] loop_set_status+0x75f/0x7e0 [ 126.218907][ T6476] lo_ioctl+0x758/0x11f0 [ 126.223218][ T6476] ? path_openat+0x19ab/0x20b0 [ 126.228049][ T6476] ? __perf_event_task_sched_out+0xce0/0xd30 [ 126.234029][ T6476] ? putname+0xa5/0xc0 [ 126.238077][ T6476] ? __perf_event_task_sched_in+0x471/0x4c0 [ 126.243956][ T6476] ? blkdev_common_ioctl+0x9c3/0x1040 [ 126.249381][ T6476] ? selinux_file_ioctl+0x8e0/0x970 [ 126.254573][ T6476] ? lo_release+0x120/0x120 [ 126.259063][ T6476] blkdev_ioctl+0x1d0/0x3c0 [ 126.263637][ T6476] block_ioctl+0x6d/0x80 [ 126.267908][ T6476] ? blkdev_iopoll+0x70/0x70 [ 126.272475][ T6476] __se_sys_ioctl+0xcb/0x140 [ 126.277076][ T6476] __x64_sys_ioctl+0x3f/0x50 [ 126.281655][ T6476] do_syscall_64+0x4a/0x90 [ 126.286111][ T6476] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.292099][ T6476] RIP: 0033:0x466397 [ 126.295980][ T6476] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.315584][ T6476] RSP: 002b:00007ff1bf414ef8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 126.324088][ T6476] RAX: ffffffffffffffda RBX: 00007ff1bf414f40 RCX: 0000000000466397 [ 126.332478][ T6476] RDX: 00007ff1bf415050 RSI: 0000000000004c04 RDI: 0000000000000005 10:50:18 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfd14) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x50000000, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x10001) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000004c0)=ANY=[], 0x208e24b) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x3, 0x0, r1, &(0x7f0000000100)={0x40000000}, r3, 0x1, 0x0, 0x1, {0x0, r4}}, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x100000000000008d, 0x0, 0x0) fdatasync(r0) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x302, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r5, 0x40043311, &(0x7f00000000c0)) 10:50:19 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 126.340428][ T6476] RBP: 00007ff1bf4151d0 R08: 0000000000000000 R09: 0000000000000000 [ 126.348403][ T6476] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ff1bf415050 [ 126.356464][ T6476] R13: 00007ffcea8e1ebf R14: 00007ff1bf415300 R15: 0000000000022000 [ 126.364417][ T6503] CPU: 0 PID: 6503 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 126.373093][ T6503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.383148][ T6503] Call Trace: [ 126.386414][ T6503] dump_stack+0x137/0x19d [ 126.390750][ T6503] should_fail+0x23c/0x250 [ 126.395167][ T6503] __should_failslab+0x81/0x90 [ 126.399931][ T6503] should_failslab+0x5/0x20 [ 126.404429][ T6503] kmem_cache_alloc_node+0x58/0x2b0 [ 126.409621][ T6503] ? alloc_vmap_area+0x12f/0x1340 [ 126.414689][ T6503] alloc_vmap_area+0x12f/0x1340 [ 126.419518][ T6503] ? kmem_cache_alloc_node_trace+0x1f6/0x2e0 [ 126.425475][ T6503] __get_vm_area_node+0x165/0x260 [ 126.430478][ T6503] __vmalloc_node_range+0xc2/0x5b0 [ 126.435610][ T6503] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 126.441182][ T6503] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 126.446784][ T6503] __vmalloc+0x5a/0x70 [ 126.449448][ T25] audit: type=1400 audit(1624359019.169:66): avc: denied { sys_admin } for pid=6504 comm="syz-executor.4" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 126.450849][ T6503] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 126.450874][ T6503] bpf_prog_alloc_no_stats+0x33/0x1f0 [ 126.484043][ T6503] bpf_prog_alloc+0x16/0xe0 [ 126.488538][ T6503] bpf_prog_create_from_user+0x6f/0x240 10:50:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, 0x0, 0x0, 0x0, 0x0) [ 126.494091][ T6503] ? seccomp_run_filters+0x2b0/0x2b0 [ 126.499409][ T6503] do_seccomp+0x5b1/0x1530 [ 126.503954][ T6503] ? __cond_resched+0x11/0x40 [ 126.508614][ T6503] ? fput+0x2d/0x130 [ 126.512505][ T6503] ? ksys_write+0x157/0x180 [ 126.516988][ T6503] __x64_sys_seccomp+0x3c/0x50 [ 126.521747][ T6503] do_syscall_64+0x4a/0x90 [ 126.526228][ T6503] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.532114][ T6503] RIP: 0033:0x4665d9 [ 126.536035][ T6503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.555634][ T6503] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 126.564477][ T6503] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 126.572444][ T6503] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 126.580716][ T6503] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 126.588675][ T6503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 10:50:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r3, r2, 0x0, 0x100000002) sendmsg$nl_xfrm(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x1150}, 0x1, 0x0, 0x0, 0x80}, 0x40) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000740), 0x10000, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000001540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="e8eb034a5582602867cf"], 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x14) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000003c0)="02adf7472f54911a4bc66825ccafa1aa17396006706a217a436eef83b0563d94c1352e56054109a0a10ef1c4ef733fde9751aab2d14917aa752b061267c40be7784a5d8bd910ae29abbedc5cfc01271962d4a91302a24e10736eb6fa30e9dad57a4c", 0x62}, {&(0x7f0000000440)="5dda91eefdecc5507122bc50f392a0c54890f55af9c716846457bcf2741f0a5a69d6976f7e3b027c2445bc769ad077a598359b84bf4ad1f8743cc1a5c29110cd595f75d24ebd4956ef9bfa9baef783be168a42a7471849f78d0d6092223bb5c0c4cdd15ee6655e36225820e9ae5a637afc420bac0596eec17c7fd594f8eec82227043eb894711d3122f8c0e5e88b2310f73212d652263fb66398f43637e3e924e214e69409595a10b93ee5de4412619f196db8c5f6078425327f7984e31697aa9407c5e29b4e363862c7aa7055b7cd", 0xcf}, {&(0x7f0000000540)="b56b4c5340adaa02f7e281d0f99bafbccb6cf59049ed1875a68677f2cc4707eaca11058353e9cc48cb3b5079c31f9afa3e569de416998ce7a95df3485ec6d8d7e9f3161f4fce2d405fd9bf1442051e45e55cffbe6599cb43ba648a58dfc5ccb4e094036cbcbfb4ad2b86a80d2363aafec173c748977dd4b7fff04f68746c4d050e", 0x81}, {&(0x7f0000000600)="295ff5c986cfe2076ecd7ae6f83f93cff36d06db25eed243718f7a22da0d6d6a6198c713f026366838217c6bd4f647f42815963d42036e5476e3ba81d870294d67d7b375900ac8d7f30faa3cc6670110b865915c0428a76a8002444cdd022ff447ac7283e2f23ad331a0671b41eb1902a1fe6bacff02c24b56cd3025375225", 0x7f}, {&(0x7f0000000680)="86eb5e6d653750028ba1966cbc77c01cb9d73857f5e8bdf29802d28a2c038fd6", 0x20}, {&(0x7f0000002700)="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", 0x1000}], 0x6, 0xd) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x64010101, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@rand_addr=' \x01\x00', 0x0, 0x6c}, @in=@private, {0xfffffffffffffffc}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 126.596629][ T6503] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 10:50:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0), 0x0, 0x0, 0x0) 10:50:19 executing program 5 (fault-call:0 fault-nth:4): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800004, 0x12, r0, 0x10000000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa0 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.857698][ T6539] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d 10:50:19 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:19 executing program 4: mlock2(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x0) fork() pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = gettid() pkey_mprotect(&(0x7f0000ff2000/0x1000)=nil, 0x1000, 0xa, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000004c0)=ANY=[], 0x208e24b) r2 = gettid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x0, &(0x7f0000002b80)={0x0, 0x0, 0x4}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x100000002) kcmp$KCMP_EPOLL_TFD(r0, r2, 0x7, r1, &(0x7f0000000080)={0xffffffffffffffff, r5, 0x80080001}) syz_io_uring_setup(0x420, &(0x7f0000000000)={0x0, 0xdf16, 0x3}, &(0x7f0000ff0000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f00000000c0)) 10:50:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x4) 10:50:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0), 0x0, 0x0, 0x0) 10:50:19 executing program 5 (fault-call:0 fault-nth:5): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 126.866209][ T6539] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 126.874172][ T6539] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 126.882120][ T6539] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 126.890089][ T6539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.898076][ T6539] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 [ 126.951884][ T25] audit: type=1326 audit(1624359019.759:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6554 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 126.957756][ T6563] loop2: detected capacity change from 0 to 1 [ 126.992729][ T6570] FAULT_INJECTION: forcing a failure. [ 126.992729][ T6570] name failslab, interval 1, probability 0, space 0, times 0 [ 127.005477][ T6570] CPU: 0 PID: 6570 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 127.014159][ T6570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.024316][ T6570] Call Trace: [ 127.027595][ T6570] dump_stack+0x137/0x19d [ 127.031921][ T6570] should_fail+0x23c/0x250 [ 127.036378][ T6570] __should_failslab+0x81/0x90 [ 127.041212][ T6570] should_failslab+0x5/0x20 [ 127.045709][ T6570] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 127.051427][ T6570] ? __kmalloc_node+0x30/0x40 [ 127.056183][ T6570] ? __get_vm_area_node+0x226/0x260 [ 127.061429][ T6570] __kmalloc_node+0x30/0x40 [ 127.065939][ T6570] __vmalloc_node_range+0x250/0x5b0 [ 127.071237][ T6570] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 127.076793][ T6570] __vmalloc+0x5a/0x70 [ 127.080855][ T6570] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 127.086395][ T6570] bpf_prog_alloc_no_stats+0x33/0x1f0 [ 127.091759][ T6570] bpf_prog_alloc+0x16/0xe0 [ 127.096279][ T6570] bpf_prog_create_from_user+0x6f/0x240 [ 127.101825][ T6570] ? seccomp_run_filters+0x2b0/0x2b0 [ 127.107100][ T6570] do_seccomp+0x5b1/0x1530 [ 127.111511][ T6570] ? __cond_resched+0x11/0x40 [ 127.116218][ T6570] ? fput+0x2d/0x130 [ 127.120096][ T6570] ? ksys_write+0x157/0x180 [ 127.124751][ T6570] __x64_sys_seccomp+0x3c/0x50 [ 127.129720][ T6570] do_syscall_64+0x4a/0x90 [ 127.134123][ T6570] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.140021][ T6570] RIP: 0033:0x4665d9 [ 127.143906][ T6570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.163757][ T6570] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 127.172794][ T6570] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 127.180887][ T6570] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 127.188958][ T6570] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 10:50:20 executing program 5 (fault-call:0 fault-nth:6): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 127.196915][ T6570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.204969][ T6570] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 10:50:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0), 0x0, 0x0, 0x0) [ 127.246603][ T6576] FAULT_INJECTION: forcing a failure. [ 127.246603][ T6576] name failslab, interval 1, probability 0, space 0, times 0 [ 127.259266][ T6576] CPU: 0 PID: 6576 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 127.268126][ T6576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.278166][ T6576] Call Trace: [ 127.281431][ T6576] dump_stack+0x137/0x19d [ 127.285763][ T6576] should_fail+0x23c/0x250 [ 127.290163][ T6576] __should_failslab+0x81/0x90 [ 127.294916][ T6576] ? bpf_prog_alloc_no_stats+0x8d/0x1f0 [ 127.300587][ T6576] should_failslab+0x5/0x20 [ 127.305218][ T6576] kmem_cache_alloc_trace+0x49/0x310 [ 127.310501][ T6576] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 127.316092][ T6576] bpf_prog_alloc_no_stats+0x8d/0x1f0 [ 127.321460][ T6576] bpf_prog_alloc+0x16/0xe0 [ 127.325997][ T6576] bpf_prog_create_from_user+0x6f/0x240 [ 127.331625][ T6576] ? seccomp_run_filters+0x2b0/0x2b0 [ 127.337020][ T6576] do_seccomp+0x5b1/0x1530 [ 127.341577][ T6576] ? __cond_resched+0x11/0x40 [ 127.346323][ T6576] ? fput+0x2d/0x130 [ 127.350224][ T6576] ? ksys_write+0x157/0x180 [ 127.354774][ T6576] __x64_sys_seccomp+0x3c/0x50 [ 127.359530][ T6576] do_syscall_64+0x4a/0x90 [ 127.363928][ T6576] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.369918][ T6576] RIP: 0033:0x4665d9 [ 127.373801][ T6576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:50:20 executing program 2: syz_read_part_table(0x2, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 127.393438][ T6576] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 127.401839][ T6576] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 127.409874][ T6576] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 127.417827][ T6576] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 127.425782][ T6576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.433744][ T6576] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 10:50:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 10:50:20 executing program 5 (fault-call:0 fault-nth:7): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:20 executing program 2: syz_read_part_table(0x3, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 127.480257][ T6584] loop2: detected capacity change from 0 to 1 10:50:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 127.530393][ T6595] FAULT_INJECTION: forcing a failure. [ 127.530393][ T6595] name failslab, interval 1, probability 0, space 0, times 0 [ 127.543132][ T6595] CPU: 0 PID: 6595 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 127.551798][ T6595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.561906][ T6595] Call Trace: [ 127.565182][ T6595] dump_stack+0x137/0x19d [ 127.569527][ T6595] should_fail+0x23c/0x250 [ 127.573948][ T6595] __should_failslab+0x81/0x90 [ 127.578834][ T6595] ? bpf_prog_alloc_no_stats+0x8d/0x1f0 [ 127.584402][ T6595] should_failslab+0x5/0x20 [ 127.588900][ T6595] kmem_cache_alloc_trace+0x49/0x310 [ 127.594291][ T6595] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 127.599861][ T6595] bpf_prog_alloc_no_stats+0x8d/0x1f0 [ 127.605235][ T6595] bpf_prog_alloc+0x16/0xe0 [ 127.609742][ T6595] bpf_prog_create_from_user+0x6f/0x240 [ 127.615362][ T6595] ? seccomp_run_filters+0x2b0/0x2b0 [ 127.620717][ T6595] do_seccomp+0x5b1/0x1530 [ 127.625268][ T6595] ? __cond_resched+0x11/0x40 [ 127.629942][ T6595] ? fput+0x2d/0x130 [ 127.633828][ T6595] ? ksys_write+0x157/0x180 [ 127.638315][ T6595] __x64_sys_seccomp+0x3c/0x50 [ 127.643093][ T6595] do_syscall_64+0x4a/0x90 [ 127.647601][ T6595] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.653507][ T6595] RIP: 0033:0x4665d9 [ 127.657427][ T6595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.677029][ T6595] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 127.685436][ T6595] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 127.693411][ T6595] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 127.701381][ T6595] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 127.709344][ T6595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.717628][ T6595] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 10:50:20 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 127.751156][ T6604] loop2: detected capacity change from 0 to 1 10:50:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0xc) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="0001004eeb5e33ffff17b7"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 10:50:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r2, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe2, 0x4) 10:50:20 executing program 5 (fault-call:0 fault-nth:8): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 127.811533][ T25] audit: type=1326 audit(1624359020.619:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6609 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 127.851694][ T6604] loop2: detected capacity change from 0 to 1 10:50:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r2, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe2, 0x4) 10:50:20 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/146, 0x92}, {&(0x7f0000000200)=""/233, 0xe9}, {&(0x7f0000000300)=""/100, 0x64}, {&(0x7f0000000380)=""/113, 0x71}], 0x4, 0xda2, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="b80000001900010000ff2de2080000007f000001000000000000000000000000fc0100000000000000000000000000000000000000fcff000a00000000000000ec1d28756ebc8e1421b32dbeb71b07baeb11a255c3053f8b97c57799cc4d35abceec35ed2a514eb65dd7e8289745b6cbcccf2badfd1169b37973a4820a33d4fca25356c7487a1cbbd774a94c9a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000eeffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006606443deaa0552eb767d38fc611d2d3d52689a69bd1dc5373260334976b7e2aa53a2b9bc1bd820bcfadf37bc9c0ac9e14cef56bb0d148570a1a4ad0f8dbe370eb5405da7a"], 0xb8}}, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x12, 0x0, 0x0) 10:50:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r2, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe2, 0x4) [ 127.856720][ T6623] FAULT_INJECTION: forcing a failure. [ 127.856720][ T6623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 127.870855][ T6623] CPU: 1 PID: 6623 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 127.879534][ T6623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.889582][ T6623] Call Trace: [ 127.892881][ T6623] dump_stack+0x137/0x19d [ 127.897237][ T6623] should_fail+0x23c/0x250 [ 127.901650][ T6623] should_fail_usercopy+0x16/0x20 [ 127.906668][ T6623] _copy_from_user+0x1c/0xd0 10:50:20 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040), 0x4) listen(r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) shutdown(r1, 0x0) 10:50:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) [ 127.911266][ T6623] bpf_prog_create_from_user+0xa6/0x240 [ 127.916823][ T6623] ? seccomp_run_filters+0x2b0/0x2b0 [ 127.922118][ T6623] do_seccomp+0x5b1/0x1530 [ 127.926534][ T6623] ? __cond_resched+0x11/0x40 [ 127.931201][ T6623] ? fput+0x2d/0x130 [ 127.935224][ T6623] ? ksys_write+0x157/0x180 [ 127.939730][ T6623] __x64_sys_seccomp+0x3c/0x50 [ 127.944731][ T6623] do_syscall_64+0x4a/0x90 [ 127.949150][ T6623] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.955060][ T6623] RIP: 0033:0x4665d9 [ 127.958938][ T6623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.978539][ T6623] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 127.986935][ T6623] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 127.994979][ T6623] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 128.002951][ T6623] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 10:50:20 executing program 2: syz_read_part_table(0x4, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:20 executing program 5 (fault-call:0 fault-nth:9): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 128.010924][ T6623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.018886][ T6623] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 [ 128.058539][ T6650] FAULT_INJECTION: forcing a failure. [ 128.058539][ T6650] name failslab, interval 1, probability 0, space 0, times 0 [ 128.071321][ T6650] CPU: 0 PID: 6650 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 128.080061][ T6650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.090120][ T6650] Call Trace: [ 128.093539][ T6650] dump_stack+0x137/0x19d [ 128.097854][ T6650] should_fail+0x23c/0x250 [ 128.102429][ T6650] ? bpf_prog_create_from_user+0x1ab/0x240 [ 128.108230][ T6650] __should_failslab+0x81/0x90 [ 128.112987][ T6650] should_failslab+0x5/0x20 [ 128.117484][ T6650] __kmalloc_track_caller+0x64/0x340 [ 128.122785][ T6650] ? kmem_cache_alloc_trace+0x215/0x310 [ 128.128322][ T6650] kmemdup+0x21/0x50 [ 128.132211][ T6650] bpf_prog_create_from_user+0x1ab/0x240 [ 128.137827][ T6650] ? seccomp_run_filters+0x2b0/0x2b0 [ 128.143117][ T6650] do_seccomp+0x5b1/0x1530 [ 128.147511][ T6650] ? __cond_resched+0x11/0x40 [ 128.152167][ T6650] ? fput+0x2d/0x130 [ 128.156175][ T6650] ? ksys_write+0x157/0x180 [ 128.160683][ T6650] __x64_sys_seccomp+0x3c/0x50 [ 128.165431][ T6650] do_syscall_64+0x4a/0x90 [ 128.169902][ T6650] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.175786][ T6650] RIP: 0033:0x4665d9 [ 128.179655][ T6650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.199396][ T6650] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 128.207897][ T6650] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 128.215861][ T6650] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 128.223932][ T6650] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 128.232154][ T6650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 128.240207][ T6650] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 [ 128.286146][ T6649] loop2: detected capacity change from 0 to 1 10:50:21 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:21 executing program 1 (fault-call:8 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)=ANY=[], 0x116) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000140), 0xfffffffffffff000, 0x50080) ioctl(r2, 0xfffffff9, &(0x7f0000000180)="e4960b9599279a1f8f9c84be5779098eea") sendfile(r1, r2, 0x0, 0xddc) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000301000/0x2000)=nil, 0x2000, 0x2000002, 0x810, r0, 0x10000000) r5 = dup3(r2, r0, 0x80000) r6 = syz_io_uring_setup(0x5ea8, &(0x7f0000000340)={0x0, 0x0, 0x8}, &(0x7f0000778000/0x3000)=nil, &(0x7f000013c000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0xa, 0x0, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000001700)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0xa, 0x0, r7) syz_io_uring_submit(0x0, r4, &(0x7f00000016c0)=@IORING_OP_SENDMSG={0x9, 0x5, 0x0, r5, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@l2tp6={0xa, 0x0, 0x5, @private1, 0x401}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000380)="e174012a0e9f62a406078ae4b83bd7d9cf2c7d7cb461191e6048e593bac3b58d95c7df76e1be5d277fe5ec38fb03d5823384a79bb7bfcc87f854835c7fbe1079927e0a4e3457899a51b92b05613f5a904528509ccf99f8929293c4465d95d5cb27f330f05231059bb254ec879f2ecd1d620df81ce8a824c27c338d967aef87a408863d2bce129626266caa0d4dfd279e1afc1bd6309193dfef80ea5bc6415b058ca712059049a9490aa792059dddeb1a96809f21e4d6ed4b6fc5e89e6fe1daec51e8165d747f6734427ba82af5482bce975127c9b79c3549b4f00666c72701", 0xdf}, {&(0x7f0000000480)="e6be805204a4b1348be97782ab793958ae59d3b29d5c77a821899b447febf9ee6e9783ca3e6e3bd7389141c941fc2ea6d2be1c0427583664992a98a2e8113ef526eec76e83289441c222e5ecbd4c8d872ed26e0725646bbcd08d8d29bb3d56c24bb86e8a94f3109ff05539d231367dc71676cd5efcc4c6ed7be9886c0e0784c1f210486eadc688fd44958fb49fef16f7eb0bd4c31d59a08ccf2004f77d3cd723e84baa9f26661346e35072bebba401dd8e203f873397801eb6cc26d9d73356097f8135898cd432d4c8a9567fcf929c66ce007b00b4be7b1e04d61b9329", 0xdd}], 0x2, &(0x7f0000000580)=[{0x28, 0x10a, 0x7, "b2ddba03c7fa36142cbf9be59626e417f4f274c67744"}, {0x100, 0x10f, 0x0, "c22106ba62a515f95c928fe00984137a139bf6439fffd70832cea228f9daee1ad9d9ec35afc04000f1b25c7abbde674c5b53986197f85a986be3b3cd3f8b3de46e78409e9e8fcad4da01e8b1e919216113ad486de73bedbf4bf8885205bd4530a88df115d26baa427d1b55e57b527780b113ab7ef12416300303cb51d233245f46de33013da671628c0e0f6d91fe59444235b7f56dcdca31ea9d3f8cc5ca24d97ab0c17ebf9f0a76261fbb97a2620f82374e230c2cc378c8228550ac23170b80691d5ca6a54f1b2d1b1e67f61b253e2b4af685cc572032809c671368a6a305e8b18b7280bb8b348b61c2dfcd8d4f"}, {0x1010, 0x109, 0x1, "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"}], 0x1138}, 0x0, 0xc095, 0x1, {0x0, r7}}, 0x40) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 10:50:21 executing program 5 (fault-call:0 fault-nth:10): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:21 executing program 2: syz_read_part_table(0x5, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 128.658556][ T25] audit: type=1326 audit(1624359021.469:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6672 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 128.682128][ T6678] FAULT_INJECTION: forcing a failure. [ 128.682128][ T6678] name failslab, interval 1, probability 0, space 0, times 0 [ 128.682888][ T6679] loop2: detected capacity change from 0 to 1 [ 128.694780][ T6678] CPU: 1 PID: 6678 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 128.701688][ T6680] loop4: detected capacity change from 0 to 16 [ 128.709481][ T6678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.709494][ T6678] Call Trace: [ 128.709501][ T6678] dump_stack+0x137/0x19d [ 128.709524][ T6678] should_fail+0x23c/0x250 [ 128.734250][ T6680] attempt to access beyond end of device [ 128.734250][ T6680] loop4: rw=2049, want=17, limit=16 [ 128.737688][ T6678] ? bpf_prog_create_from_user+0x1ab/0x240 [ 128.737716][ T6678] __should_failslab+0x81/0x90 10:50:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:21 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/kernel/kexec_crash_size', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r2, r1, &(0x7f0000000040)=0xeb5, 0x3) sendfile(r2, r1, 0x0, 0x100000002) ioctl$TIOCMGET(r1, 0x5415, &(0x7f00000000c0)) sendfile(r1, r0, &(0x7f0000000000)=0xff, 0x5) sendfile(r0, r0, 0x0, 0x6) [ 128.758903][ T6678] should_failslab+0x5/0x20 [ 128.763514][ T6678] __kmalloc_track_caller+0x64/0x340 [ 128.768954][ T6678] ? kmem_cache_alloc_trace+0x215/0x310 [ 128.774500][ T6678] kmemdup+0x21/0x50 [ 128.778386][ T6678] bpf_prog_create_from_user+0x1ab/0x240 [ 128.784022][ T6678] ? seccomp_run_filters+0x2b0/0x2b0 [ 128.789439][ T6678] do_seccomp+0x5b1/0x1530 [ 128.793838][ T6678] ? __cond_resched+0x11/0x40 [ 128.798509][ T6678] ? fput+0x2d/0x130 [ 128.802592][ T6678] ? ksys_write+0x157/0x180 [ 128.807078][ T6678] __x64_sys_seccomp+0x3c/0x50 [ 128.810890][ T6694] FAULT_INJECTION: forcing a failure. [ 128.810890][ T6694] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 128.811846][ T6678] do_syscall_64+0x4a/0x90 [ 128.811869][ T6678] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.835218][ T6678] RIP: 0033:0x4665d9 [ 128.839094][ T6678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.858906][ T6678] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 128.867297][ T6678] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 128.875243][ T6678] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 128.883225][ T6678] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 128.891173][ T6678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 128.899122][ T6678] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 10:50:21 executing program 5 (fault-call:0 fault-nth:11): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 128.907072][ T6694] CPU: 0 PID: 6694 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 128.915790][ T6694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.925837][ T6694] Call Trace: [ 128.929109][ T6694] dump_stack+0x137/0x19d [ 128.933496][ T6694] should_fail+0x23c/0x250 [ 128.938034][ T6694] should_fail_usercopy+0x16/0x20 [ 128.939951][ T6700] FAULT_INJECTION: forcing a failure. [ 128.939951][ T6700] name failslab, interval 1, probability 0, space 0, times 0 [ 128.943055][ T6694] _copy_from_user+0x1c/0xd0 [ 128.943081][ T6694] iovec_from_user+0xc4/0x2d0 [ 128.964969][ T6694] __import_iovec+0x49/0x270 [ 128.969550][ T6694] ? fsnotify_perm+0x59/0x2e0 [ 128.974213][ T6694] ? __fsnotify_parent+0x32f/0x430 [ 128.979309][ T6694] import_iovec+0x69/0x80 [ 128.983621][ T6694] do_preadv+0x109/0x230 [ 128.987890][ T6694] ? __fget_light+0x21b/0x260 [ 128.992551][ T6694] ? __cond_resched+0x11/0x40 [ 128.997225][ T6694] ? fput+0x2d/0x130 [ 129.001167][ T6694] ? ksys_write+0x157/0x180 [ 129.005647][ T6694] __x64_sys_preadv+0x54/0x60 [ 129.010329][ T6694] do_syscall_64+0x4a/0x90 [ 129.014729][ T6694] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.020760][ T6694] RIP: 0033:0x4665d9 [ 129.024637][ T6694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.044227][ T6694] RSP: 002b:00007faa54bdf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 129.052626][ T6694] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665d9 [ 129.060586][ T6694] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000005 [ 129.068569][ T6694] RBP: 00007faa54bdf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 129.076520][ T6694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 129.084472][ T6694] R13: 00007ffeeeab161f R14: 00007faa54bdf300 R15: 0000000000022000 [ 129.092558][ T6700] CPU: 1 PID: 6700 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 10:50:21 executing program 1 (fault-call:8 fault-nth:1): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 129.101237][ T6700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.111275][ T6700] Call Trace: [ 129.114547][ T6700] dump_stack+0x137/0x19d [ 129.118991][ T6700] should_fail+0x23c/0x250 [ 129.123489][ T6700] ? kmalloc_array+0x2d/0x40 [ 129.128095][ T6700] __should_failslab+0x81/0x90 [ 129.132909][ T6700] should_failslab+0x5/0x20 [ 129.137570][ T6700] __kmalloc+0x66/0x340 [ 129.141710][ T6700] ? pcpu_alloc+0xc50/0x1200 [ 129.146317][ T6700] kmalloc_array+0x2d/0x40 [ 129.150738][ T6700] ? seccomp_run_filters+0x2b0/0x2b0 [ 129.156007][ T6700] bpf_prepare_filter+0x3de/0xaf0 [ 129.161043][ T6700] ? seccomp_run_filters+0x2b0/0x2b0 [ 129.166330][ T6700] bpf_prog_create_from_user+0x1dc/0x240 [ 129.171972][ T6700] ? seccomp_run_filters+0x2b0/0x2b0 [ 129.177275][ T6700] do_seccomp+0x5b1/0x1530 [ 129.181687][ T6700] ? __cond_resched+0x11/0x40 [ 129.186365][ T6700] ? fput+0x2d/0x130 [ 129.190247][ T6700] ? ksys_write+0x157/0x180 [ 129.194798][ T6700] __x64_sys_seccomp+0x3c/0x50 [ 129.199700][ T6700] do_syscall_64+0x4a/0x90 [ 129.204180][ T6700] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.210111][ T6700] RIP: 0033:0x4665d9 [ 129.213982][ T6700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.229508][ T6705] FAULT_INJECTION: forcing a failure. [ 129.229508][ T6705] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 129.233640][ T6700] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 129.233660][ T6700] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 129.233670][ T6700] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 129.270980][ T6700] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 129.278929][ T6700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 129.286887][ T6700] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 [ 129.294859][ T6705] CPU: 0 PID: 6705 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 129.303544][ T6705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.313586][ T6705] Call Trace: [ 129.316861][ T6705] dump_stack+0x137/0x19d [ 129.321200][ T6705] should_fail+0x23c/0x250 [ 129.323801][ T6707] FAULT_INJECTION: forcing a failure. [ 129.323801][ T6707] name failslab, interval 1, probability 0, space 0, times 0 [ 129.325602][ T6705] should_fail_usercopy+0x16/0x20 [ 129.325623][ T6705] _copy_from_user+0x1c/0xd0 [ 129.325644][ T6705] kstrtouint_from_user+0x6f/0x130 [ 129.352849][ T6705] ? _copy_to_user+0x77/0x90 [ 129.357427][ T6705] ? fsnotify_perm+0x59/0x2e0 [ 129.362083][ T6705] proc_fail_nth_write+0x38/0x140 [ 129.367101][ T6705] ? proc_fail_nth_read+0x140/0x140 [ 129.372281][ T6705] vfs_write+0x1f3/0x770 [ 129.376518][ T6705] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 129.382046][ T6705] ? __fget_light+0x21b/0x260 [ 129.386705][ T6705] ? __cond_resched+0x11/0x40 [ 129.391357][ T6705] ksys_write+0xce/0x180 [ 129.395577][ T6705] __x64_sys_write+0x3e/0x50 [ 129.400146][ T6705] do_syscall_64+0x4a/0x90 [ 129.404543][ T6705] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.410545][ T6705] RIP: 0033:0x4192bf [ 129.414417][ T6705] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 129.434087][ T6705] RSP: 002b:00007faa54bdf170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 129.442482][ T6705] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004192bf [ 129.450432][ T6705] RDX: 0000000000000001 RSI: 00007faa54bdf1e0 RDI: 0000000000000005 10:50:22 executing program 5 (fault-call:0 fault-nth:12): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 129.458382][ T6705] RBP: 00007faa54bdf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 129.466333][ T6705] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 129.474345][ T6705] R13: 00007ffeeeab161f R14: 00007faa54bdf300 R15: 0000000000022000 [ 129.482302][ T6707] CPU: 1 PID: 6707 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 129.490978][ T6707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.501078][ T6707] Call Trace: [ 129.504340][ T6707] dump_stack+0x137/0x19d [ 129.508713][ T6707] should_fail+0x23c/0x250 [ 129.513109][ T6707] ? kmalloc_array+0x2d/0x40 [ 129.517727][ T6707] __should_failslab+0x81/0x90 [ 129.522473][ T6707] should_failslab+0x5/0x20 [ 129.526958][ T6707] __kmalloc+0x66/0x340 [ 129.531094][ T6707] kmalloc_array+0x2d/0x40 [ 129.535491][ T6707] bpf_convert_filter+0x81/0x23f0 [ 129.540517][ T6707] ? __inc_numa_state+0x10/0x50 [ 129.545399][ T6707] ? pcpu_chunk_relocate+0xe2/0x2d0 [ 129.550711][ T6707] bpf_prepare_filter+0x97b/0xaf0 [ 129.555814][ T6707] ? seccomp_run_filters+0x2b0/0x2b0 [ 129.561082][ T6707] bpf_prog_create_from_user+0x1dc/0x240 [ 129.566757][ T6707] ? seccomp_run_filters+0x2b0/0x2b0 [ 129.572018][ T6707] do_seccomp+0x5b1/0x1530 [ 129.576414][ T6707] ? __cond_resched+0x11/0x40 [ 129.581091][ T6707] ? fput+0x2d/0x130 [ 129.584967][ T6707] ? ksys_write+0x157/0x180 [ 129.589451][ T6707] __x64_sys_seccomp+0x3c/0x50 [ 129.594229][ T6707] do_syscall_64+0x4a/0x90 [ 129.598654][ T6707] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.604527][ T6707] RIP: 0033:0x4665d9 [ 129.608401][ T6707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.628432][ T6707] RSP: 002b:00007f70e3a36188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 129.636819][ T6707] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 129.644784][ T6707] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 129.652752][ T6707] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 10:50:22 executing program 2: syz_read_part_table(0x6, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:22 executing program 5 (fault-call:0 fault-nth:13): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 129.660702][ T6707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 129.668650][ T6707] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 10:50:22 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 129.712049][ T6711] FAULT_INJECTION: forcing a failure. [ 129.712049][ T6711] name failslab, interval 1, probability 0, space 0, times 0 [ 129.724743][ T6711] CPU: 1 PID: 6711 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 129.730753][ T6715] loop2: detected capacity change from 0 to 1 [ 129.733420][ T6711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.733431][ T6711] Call Trace: [ 129.733437][ T6711] dump_stack+0x137/0x19d [ 129.757108][ T6711] should_fail+0x23c/0x250 10:50:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 129.761522][ T6711] ? audit_log_start+0x37c/0x6d0 [ 129.766459][ T6711] __should_failslab+0x81/0x90 [ 129.771263][ T6711] should_failslab+0x5/0x20 [ 129.775755][ T6711] kmem_cache_alloc+0x46/0x2f0 [ 129.780778][ T6711] audit_log_start+0x37c/0x6d0 [ 129.785543][ T6711] audit_seccomp+0x45/0xf0 [ 129.789971][ T6711] __seccomp_filter+0xd57/0xeb0 [ 129.794812][ T6711] ? seccomp_cache_prepare_bitmap+0x35b/0x370 [ 129.800881][ T6711] __secure_computing+0xfb/0x140 [ 129.805912][ T6711] syscall_trace_enter+0x120/0x290 [ 129.811028][ T6711] ? exit_to_user_mode_prepare+0x65/0x190 [ 129.816732][ T6711] syscall_enter_from_user_mode+0x1c/0x20 [ 129.822436][ T6711] do_syscall_64+0x27/0x90 [ 129.826838][ T6711] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.832712][ T6711] RIP: 0033:0x41935c [ 129.836584][ T6711] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 129.856165][ T6711] RSP: 002b:00007f70e3a36170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 129.864549][ T6711] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041935c [ 129.872547][ T6711] RDX: 000000000000000f RSI: 00007f70e3a361e0 RDI: 0000000000000003 [ 129.880504][ T6711] RBP: 00007f70e3a361d0 R08: 0000000000000000 R09: 0000000000000000 [ 129.888471][ T6711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 129.896465][ T6711] R13: 00007ffc227d003f R14: 00007f70e3a36300 R15: 0000000000022000 [ 129.904549][ T6711] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 10:50:22 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0x2000}], 0x1, 0x0, 0x0) [ 129.912204][ T6711] audit: out of memory in audit_log_start [ 129.912587][ T25] audit: type=1326 audit(1624359022.720:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6713 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:22 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x200, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2, 0x4, 0x0, 0x0, 0x0, 0x2, 0xa604, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x1, 0x8000000000000}, 0x11, 0x2, 0x6, 0x6, 0x0, 0xac, 0x4, 0x0, 0xf1f7, 0x0, 0x3f}, 0x0, 0x1, r0, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 129.990238][ T6715] loop2: detected capacity change from 0 to 1 [ 129.998293][ T25] audit: type=1326 audit(1624359022.810:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6737 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 130.023949][ T6749] PM: suspend entry (deep) 10:50:22 executing program 2: syz_read_part_table(0x7, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 130.037234][ T6749] Filesystems sync: 0.008 seconds [ 130.044186][ T6749] Freezing user space processes ... [ 150.056456][ T6749] Freezing of tasks failed after 20.009 seconds (1 tasks refusing to freeze, wq_busy=0): [ 150.066303][ T6749] task:syz-executor.4 state:D stack:13808 pid: 5302 ppid: 1766 flags:0x00004004 [ 150.075545][ T6749] Call Trace: [ 150.078823][ T6749] __schedule+0x41f/0x5b0 [ 150.083197][ T6749] ? prepare_to_wait_event+0x13f/0x190 [ 150.088652][ T6749] schedule+0x67/0x90 [ 150.092603][ T6749] p9_client_rpc+0x254/0x630 [ 150.097170][ T6749] ? add_wait_queue+0x48/0xa0 [ 150.101912][ T6749] ? init_wait_entry+0x30/0x30 [ 150.106775][ T6749] p9_client_version+0x8e/0x300 [ 150.111682][ T6749] ? p9_fd_create+0x1d1/0x1e0 [ 150.116374][ T6749] p9_client_create+0x601/0x6f0 [ 150.121207][ T6749] ? __kmalloc_track_caller+0x23b/0x340 [ 150.126793][ T6749] v9fs_session_init+0x100/0xcf0 [ 150.131724][ T6749] ? __next_zones_zonelist+0x4f/0x90 [ 150.136988][ T6749] ? kmem_cache_alloc_trace+0x215/0x310 [ 150.142506][ T6749] ? v9fs_mount+0x41/0x4c0 [ 150.146921][ T6749] v9fs_mount+0x57/0x4c0 [ 150.151166][ T6749] ? selinux_capable+0x34/0x40 [ 150.155955][ T6749] ? tsan.module_ctor+0x10/0x10 [ 150.160783][ T6749] legacy_get_tree+0x70/0xc0 [ 150.165548][ T6749] vfs_get_tree+0x4a/0x1a0 [ 150.169940][ T6749] path_mount+0x11d4/0x1ce0 [ 150.174459][ T6749] __se_sys_mount+0x23d/0x2e0 [ 150.179127][ T6749] ? __fpregs_load_activate+0x8f/0x1b0 [ 150.184578][ T6749] __x64_sys_mount+0x63/0x70 [ 150.189153][ T6749] do_syscall_64+0x4a/0x90 [ 150.193542][ T6749] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 150.199434][ T6749] RIP: 0033:0x4665d9 [ 150.203300][ T6749] RSP: 002b:00007ff36b600188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 150.211780][ T6749] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 150.219756][ T6749] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 0000000000000000 [ 150.227751][ T6749] RBP: 00000000004bfcb9 R08: 0000000020000140 R09: 0000000000000000 [ 150.235719][ T6749] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 150.243669][ T6749] R13: 00007fffa4b407cf R14: 00007ff36b600300 R15: 0000000000022000 10:50:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0x3000}], 0x1, 0x0, 0x0) 10:50:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) [ 150.251646][ T6749] [ 150.253974][ T6749] OOM killer enabled. [ 150.257928][ T6749] Restarting tasks ... [ 150.262921][ T1035] synth uevent: /devices/virtual/block/loop2: failed to send uevent [ 150.275345][ T1035] block loop2: uevent: failed to send synthetic uevent [ 150.291721][ T6749] done. [ 150.294506][ T6749] PM: suspend exit 10:50:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:43 executing program 4: r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f00000005c0)={0x0, 0x0, 0x1}) [ 150.299375][ T6754] loop2: detected capacity change from 0 to 1 10:50:43 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) [ 150.327099][ T25] audit: type=1326 audit(1624359043.132:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6762 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:43 executing program 4: syz_open_dev$rtc(&(0x7f0000000100), 0x1, 0x0) 10:50:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f00000024c0)=[{{&(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000000300)=[@mark={{0x14}}, @mark={{0x14}}], 0x30}}], 0x1, 0x0) 10:50:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0x4000}], 0x1, 0x0, 0x0) [ 150.357601][ T25] audit: type=1326 audit(1624359043.162:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6767 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:43 executing program 4: socketpair(0x2, 0x2, 0x1, &(0x7f0000000480)) [ 150.426054][ T6754] loop2: detected capacity change from 0 to 1 10:50:43 executing program 2: syz_read_part_table(0x8, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x7, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 150.558115][ T6804] loop2: detected capacity change from 0 to 1 [ 150.658090][ T6804] loop2: detected capacity change from 0 to 1 10:50:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000000), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000040)) 10:50:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x9, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:44 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0x5000}], 0x1, 0x0, 0x0) 10:50:44 executing program 2: syz_read_part_table(0x9, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x168}, 0x8}, 0x0) 10:50:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x14, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:44 executing program 4: add_key$fscrypt_provisioning(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:50:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3b00, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0x6000}], 0x1, 0x0, 0x0) 10:50:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={0x0}}, 0x0) [ 151.223880][ T6841] loop2: detected capacity change from 0 to 1 [ 151.236155][ T25] audit: type=1326 audit(1624359044.042:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6833 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:44 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000028c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@size}]}) 10:50:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2ef70, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 152.017587][ T6876] tmpfs: Bad value for 'uid' 10:50:44 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:44 executing program 2: syz_read_part_table(0xa, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0x7000}], 0x1, 0x0, 0x0) 10:50:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1f00a8, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f00000024c0)=[{{&(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000001640)=[@txtime={{0x18, 0x1, 0x24}}], 0x18}}], 0x1, 0x0) 10:50:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000000000, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0x9000}], 0x1, 0x0, 0x0) 10:50:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 152.074270][ T6876] tmpfs: Bad value for 'uid' [ 152.083041][ T25] audit: type=1326 audit(1624359044.892:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6885 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 152.108508][ T6893] loop2: detected capacity change from 0 to 1 10:50:44 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000340)) [ 152.168233][ T25] audit: type=1326 audit(1624359044.972:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6910 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 152.201681][ T6893] loop2: detected capacity change from 0 to 1 10:50:45 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x4) 10:50:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000005180)={0x0, 0x0, &(0x7f0000005140)={&(0x7f0000000140)={0xec4, 0xd, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x3d8, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}, {0x3cc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x104, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xfe, 0x1, "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"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_DATA={0x11c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VERDICT={0x64, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x70, 0x1, "a0469bb904355dee2a1c8422ce06ffe329d678629b0a65ebf38acafacc84d2a153f3b0436db896612ad08fd7cfa724b732c537e0185266194f93fc0b9020baf50bf6740455cbd96888fe0d81e57fef46ec10e6a7c41806ed614c79eee2fc44a49563d8529814f4c0ff7c53b9"}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY_END={0x114, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xf6, 0x1, "eb149790306baab035dc083f4d60ac3cf2fc4380952e31f855ef9ed5d6a2c863269a040ac43f3640ec0484ac164488e64a09c5d3651eca56ff937b7bc8d119cd512a6e3356e99eb1928b2534874ea6b6775fa393d8ddbe4fd250e8f14c8c155d49273fb42f2f350cd401ffd7c709c985b20263f616b8cf2d4aa0b3e9fad33c352cdced6987585a93e2c4e6613c0fea61ec07e2f09d9ff92892cfa1e33f04cf2f92c7791cfb250240246c59063575cab0d1394eb767c2b198f4a53dc0454213f1d709a77f16d4ffa3efb410b1df065e53d8ba6012f37705eacccdebd151bbc27ea8dad03f0dcf1a2c030d1336926cd180ccc8"}]}, @NFTA_SET_ELEM_DATA={0x78, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}]}]}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x220, 0x3, 0x0, 0x1, [{0x21c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_KEY={0x20c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x7d, 0x1, "b4c90863b5119e9fe32ed33a7dadb2002e4edb83bc0e58d7e0aea516ca4cccae7ae9501fc5463a6006189ea02934d4591d53b53b62ef71c192e69606a11b76601577fed033c684b7d69638248ab9d2b2790cc798e6d75d0b8c46c7b8f3ad2f9b197558183984f29225d858e167748dc553201f00cad2fb0d40"}, @NFTA_DATA_VALUE={0xa6, 0x1, "fdebe6f51da806909e04b7d76182929a69e9d187f0b60996a1f7b148f133c5038e901b725422e2cbc5bce931fa93166faded9d9e5356d1c7d8ea18d17e7f41f10d982487c555422f8243fdb70c8f75a7e3715bc4d73e31fe4b37a3fbdf940bd4d54c04b64731c3c49fc5b27e3ed54851e02c9defce237c121b32b6e06c07c2cb3ed0e26e66e6179a4511922c198613b863527b9aeeda4526ed8ae44a9a20418addec"}, @NFTA_DATA_VALUE={0xa5, 0x1, "64f60bee3d0a01fbdeaff52421c41e0269d09e51a38c2aea11ed8100dc16d96b95cf1cc3e28f84feb96f0be0941a28c0c7c0f7252b6da9705272355a6787ba9d105b7659806cca2bc11cb67c85938b2808ef89291ab52bf48705b814a50793405053f0fec7bd458876fd8fd6aa2d5ae597fd589091c19585126ed39d54dc875b5164765a22c173d2d2a8bc1e7f67597437963db5f9a7e0492d623f82b765522b59"}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x880, 0x3, 0x0, 0x1, [{0x12c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_KEY={0x1c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0xd9, 0x6, 0x1, 0x0, "d8c75c963d43309bc1a2fdf4bc99db2ccaabf658e07a94f51e9bc7d2ff33e14009ad307780c0eb9cae8ad13071be34a3430a38c8c1d3c0f133b90bee9afb74d2dd6dd8be2df6f168bf5f9b4bb57141a64d1b4515113c7bc3c0f39140a790b25def0e49483d411b0317c92627e75992193e1d5b0074cec29c2ee5307bd022e24964740f92da06ba75b2e714a2191d6907525d8c482bc0f5a271fa7e4d8f77a429876c33694c620955b272922b7ff13f531cae8658bf7c7fbbf0efd269a04f9153def688f8595ee378635920b9be14b1a871a227c2cf"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}]}, {0x5c0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_KEY={0x28c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xf9, 0x1, "cf49b77130b6fa89dfa0e803d5eb015aee26d2b348cfe3c29dd8bab7fc6d8b435bc29a3759a796d3e5959513684bc45cdbca966864c49256a3af4ca749f9f50a365d3fe1c25d62dff8333f88da2036c93d1d31dd835ff544aa3c229d3dd6cb0b5562dcc5efacf173f54d50f3d5c782c7346e42304ff86f18729dd6d27d1fa9fea745892d99036ed6b9925a557cf43822600811e8f3c3e61c7eb9fd99a42584e79526ad16d686d0c130e153e86409f7ccf7b3bfffbeab852f1836731c4375d07eede70c9d7dd183561cf194f27877f9a27ff294209c5eacb37efb7e6e645846038209d1292feeadaf7414733995c0b93e8010e76d7e"}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xe9, 0x1, "4daf69b8915f5fd8f3e7615f07e79d0408bb6e5c70ff88078d778c396659802b32d079f79ea1d96f9f2c7bdaa9955c96c0393dedb852a1f6b5dacbbbaeb4d0b4784e802cd605989fcc469596d0de47ede8c72bbecb94f578b99c2ea2cb9aade15a18ebf1179231e5796b057cbfdaaafe891781699fc432793d6420db0f1baa40af97f71bf5a59a52a9315593465156f2a47a45c7f7f6e3fd876c66a71460c4a2991f89d0a88ca090749059071bcb60fafb46780125e2c35cacd5a407b3c7dd9ef3d2182df5bc17c2833dfac0fb998ffd40c7f26ac28e1a1721f873418e3768f0784f0e8f8a"}]}, @NFTA_SET_ELEM_KEY_END={0x328, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x68, 0x1, "2e3cde8bd09bfb8761d48dae5bad8ea321f14202b87092a9056635a199dd1d16fde2a5ff700e188f52d29c1cf9199a7c92eed6127a2801bb03e3459484c098a9b9569dac91a31e3c36a93d12d8b9ac8f1c878e148b91776e8c33057c9a6148f361667eef"}, @NFTA_DATA_VALUE={0x81, 0x1, "db940990f0d043500592665ef15191a6c034ea0d9d6843b84dc8da22b9a332c9a05c89d58d6f976f41a33b045f557cd23534f2c1b0efb586f6454038c54c3ff56e1a8e79be176bc99cb59f837937406ff106ef528a48d6fdbef30a8aa11a8d559cf4f65e052464bebe98cb99e45c57f06bbd5379a3ace93053d047cc5b"}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xf5f3223fcccf76af}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x30, 0x1, "2acb424a632bef580bb8d8a4fdff0b3a8a607c364a1cc7238726ad146bb33aae84f278b4996b68504d65d34f"}, @NFTA_DATA_VALUE={0x5c, 0x1, "badfef6680807f6192b3af7f8812ed42f6ca7e4bb350f3e16012a0f7c0008a99491cc3ef9415842b53968474f910371e81c33694ee69bd8c830ed4652e0e2a6c1ee30494eea28c08689f221f6e6e3693326c259a7b74ee22"}, @NFTA_DATA_VALUE={0xbe, 0x1, "e8c9d877b681cf79450ca979996d827ec2e3b53a592ed5b3a92aefffbcca9f5436c9ba2cd2c6429ff77a105f4b1637897bbd01a455a08758baf5d26b491145986eb2c928d5d113cb56652983fe2213de81d3d58403d3e7eafef4a83eea210c6f23ab1be728900be8f57092b7ac6669edc1c76f31be440d3f827c6a5c2eaee45ceb5c8b9496a926237233b75961b052ca4d65a278fbe3664041f57d08561bb58e361e8ecb13f1c393643a7a8ed41adbd06c5ff75aa3e9910770b6"}]}]}, {0x108, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x100000001}, @NFTA_SET_ELEM_KEY={0xdc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5e, 0x1, "02c7c05f43cb631ab8b709178209030491ab5ae741b25aab86452148e4be05621d7094450a66afdddb44c40e7af170e64a75117aa2bd63324220da95b44b4f4a869389f4a97f6bfe67c650934834b80be4e31ac611df9258f91a"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x8000000000000005}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}, {0x88, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY_END={0x78, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x57, 0x1, "5156305d9df9b3b5f4908d8656c187682790970ee949f0ee6bd8f55246011008392e628462c784bf0f078bbaa5856aa77ddc6f7f5669fb959785b66b963bbe06e0ab0d5e7d0d5fb4ae4d19f651b6e22327bae1"}]}, @NFTA_SET_ELEM_USERDATA={0x4}]}]}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0xec4}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 10:50:45 executing program 2: syz_read_part_table(0xb, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:45 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xa000}], 0x1, 0x0, 0x0) 10:50:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="840000000202010300000000000000000a0000082c001080080001400000040108000340000f007f080002400000000608000140ffffff67080001400000db29200002800600034000020000040001"], 0x84}}, 0x0) [ 152.877414][ T6939] loop2: detected capacity change from 0 to 1 10:50:45 executing program 2: syz_read_part_table(0xc, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:45 executing program 4: symlinkat(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 10:50:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 152.931642][ T6952] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 152.941834][ T6952] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 152.941945][ T25] audit: type=1326 audit(1624359045.752:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6953 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xb000}], 0x1, 0x0, 0x0) 10:50:45 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 153.020150][ T6965] loop2: detected capacity change from 0 to 1 [ 153.037495][ T25] audit: type=1326 audit(1624359045.762:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6950 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 153.067430][ T25] audit: type=1326 audit(1624359045.792:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6953 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4193eb code=0x0 [ 153.091345][ T25] audit: type=1326 audit(1624359045.832:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6962 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 153.158411][ T6965] loop2: detected capacity change from 0 to 1 10:50:46 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x4) 10:50:46 executing program 4: futex(0x0, 0x80, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) 10:50:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xc000}], 0x1, 0x0, 0x0) 10:50:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:46 executing program 2: syz_read_part_table(0xd, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8912, 0x0) 10:50:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xd000}], 0x1, 0x0, 0x0) 10:50:46 executing program 4: r0 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) fsmount(r0, 0x0, 0x8) 10:50:46 executing program 4: fsopen(&(0x7f0000000100)='configfs\x00', 0x0) 10:50:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xda00}], 0x1, 0x0, 0x0) [ 153.795688][ T25] audit: type=1326 audit(1624359046.602:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7011 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 153.825378][ T7013] loop2: detected capacity change from 0 to 1 [ 153.908176][ T7013] loop2: detected capacity change from 0 to 1 10:50:47 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000300), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000000000021"], 0x18, 0xfffffffffffffffe) 10:50:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdee}], 0x1, 0x0, 0x0) 10:50:47 executing program 2: syz_read_part_table(0xe, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:47 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x4) 10:50:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:47 executing program 4: fsopen(&(0x7f0000000080)='bdev\x00', 0x0) 10:50:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0x2000feef}], 0x1, 0x0, 0x0) [ 154.594447][ T7055] loop2: detected capacity change from 0 to 1 10:50:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000010c0)=0xffffffffffffffff, 0x4) 10:50:47 executing program 4: r0 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x3, 0x0, 0x0, 0xffffffffffffffff) 10:50:47 executing program 2: syz_read_part_table(0xf, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0x7ffff000}], 0x1, 0x0, 0x0) 10:50:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="68010000020101020000000000000c000006"], 0x168}}, 0x0) 10:50:47 executing program 4: futex(&(0x7f0000000000), 0x8c, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x1) [ 154.711334][ T7089] loop2: detected capacity change from 0 to 1 [ 154.732233][ T7100] netlink: 340 bytes leftover after parsing attributes in process `syz-executor.4'. 10:50:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8}, {0xe45, 0xaf, 0x81, 0x1}, {0xffe8, 0x12, 0x22, 0x400}]}) 10:50:48 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:48 executing program 2: syz_read_part_table(0x10, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xffffffff000}], 0x1, 0x0, 0x0) 10:50:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f00000018c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) 10:50:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xffffffffffffffff}], 0x1, 0x0, 0x0) 10:50:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 155.504091][ T25] kauditd_printk_skb: 7 callbacks suppressed [ 155.504101][ T25] audit: type=1326 audit(1624359048.302:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 155.533859][ T7119] loop2: detected capacity change from 0 to 1 10:50:48 executing program 4: futex(&(0x7f0000000000), 0xb, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080), 0x0) 10:50:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x2, 0x0, 0x0) 10:50:48 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) 10:50:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x8902, &(0x7f0000000040)) [ 155.581694][ T25] audit: type=1326 audit(1624359048.382:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 155.621521][ T7119] loop2: detected capacity change from 0 to 1 10:50:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 10:50:49 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x3, 0x0, 0x0) 10:50:49 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x3}) 10:50:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x10, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:49 executing program 2: syz_read_part_table(0x11, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 156.352506][ T25] audit: type=1326 audit(1624359049.152:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7177 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x168}, 0x8, 0xf0ffffff7f0000}, 0x0) 10:50:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() sendmmsg$unix(r0, &(0x7f0000000b40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}], 0x20}], 0x1, 0x0) 10:50:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x4, 0x0, 0x0) 10:50:49 executing program 2: syz_read_part_table(0x12, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 156.398328][ T7190] loop2: detected capacity change from 0 to 1 [ 156.406402][ T25] audit: type=1326 audit(1624359049.212:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7184 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) recvmmsg(r0, &(0x7f00000019c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)=""/4110, 0x100e}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 10:50:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x5, 0x0, 0x0) [ 156.531305][ T7228] loop2: detected capacity change from 0 to 1 10:50:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x6, 0x0, 0x0) 10:50:50 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x40087602, 0x0) 10:50:50 executing program 2: syz_read_part_table(0x25, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:50 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000400), 0x1, 0x0) 10:50:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x7, 0x0, 0x0) 10:50:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x1c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}}, 0x0) 10:50:50 executing program 4: clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000080)={0x8}, &(0x7f00000000c0)={0x0, r0+10000000}, &(0x7f0000000140)={&(0x7f0000000100)={[0x3ff]}, 0x8}) [ 157.289635][ T25] audit: type=1326 audit(1624359050.092:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7248 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x8, 0x0, 0x0) 10:50:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000005180)={0x0, 0x0, &(0x7f0000005140)={&(0x7f0000000140)={0x4c88, 0xd, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x1ac, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}, {0x1a0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x104, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xfe, 0x1, "2af9d71eaae47ab5f903c9a2892bea937aad6a425616e8ef2d4e6994d8e83d251aa0c332b7f3578a6c67c6aab941ab0f854c920f423ca4d8aee3143a86d10418a55a28d89b6e4c854ff6da6ae4296810a3a9abaa9358c3d26346ce4c42a5cf2c7ebf0be3f038bcf83c0f9e70dad9ea63f52b2c9bdc3a7b82dc0f6117061367ddf98b91c2c7bbc32f1f28035c9cbede85b7ec1a9055376d803837ff76236dd139bf1717774835b147faf83fcee0a83af909b188d7b65f0e3751c120dc95bec3c1a649f2d3231a9758c2e384646873020f22497d799ac369f876b02038c88b18e573193b12681bdc50aa42fade2a934c089354a55c835f25c656e0"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_DATA={0x8, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4}]}, @NFTA_SET_ELEM_KEY_END={0x4}, @NFTA_SET_ELEM_DATA={0x78, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x3}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}]}]}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x220, 0x3, 0x0, 0x1, [{0x21c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_KEY={0x20c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x7e, 0x1, "b4c90863b5119e9fe32ed33a7dadb2002e4edb83bc0e58d7e0aea516ca4cccae7ae9501fc5463a6006189ea02934d4591d53b53b62ef71c192e69606a11b76601577fed033c684b7d69638248ab9d2b2790cc798e6d75d0b8c46c7b8f3ad2f9b197558183984f29225d858e167748dc553201f00cad2fb0d40ff"}, @NFTA_DATA_VALUE={0xa6, 0x1, "fdebe6f51da806909e04b7d76182929a69e9d187f0b60996a1f7b148f133c5038e901b725422e2cbc5bce931fa93166faded9d9e5356d1c7d8ea18d17e7f41f10d982487c555422f8243fdb70c8f75a7e3715bc4d73e31fe4b37a3fbdf940bd4d54c04b64731c3c49fc5b27e3ed54851e02c9defce237c121b32b6e06c07c2cb3ed0e26e66e6179a4511922c198613b863527b9aeeda4526ed8ae44a9a20418addec"}, @NFTA_DATA_VALUE={0xa8, 0x1, "64f60bee3d0a01fbdeaff52421c41e0269d09e51a38c2aea11ed8100dc16d96b95cf1cc3e28f84feb96f0be0941a28c0c7c0f7252b6da9705272355a6787ba9d105b7659806cca2bc11cb67c85938b2808ef89291ab52bf48705b814a50793405053f0fec7bd458876fd8fd6aa2d5ae597fd589091c19585126ed39d54dc875b5164765a22c173d2d2a8bc1e7f67597437963db5f9a7e0492d623f82b765522b5933298c"}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x22bc, 0x3, 0x0, 0x1, [{0x12c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x100000001}, @NFTA_SET_ELEM_KEY={0x1c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_USERDATA={0xd9, 0x6, 0x1, 0x0, "d8c75c963d43309bc1a2fdf4bc99db2ccaabf658e07a94f51e9bc7d2ff33e14009ad307780c0eb9cae8ad13071be34a3430a38c8c1d3c0f133b90bee9afb74d2dd6dd8be2df6f168bf5f9b4bb57141a64d1b4515113c7bc3c0f39140a790b25def0e49483d411b0317c92627e75992193e1d5b0074cec29c2ee5307bd022e24964740f92da06ba75b2e714a2191d6907525d8c482bc0f5a271fa7e4d8f77a429876c33694c620955b272922b7ff13f531cae8658bf7c7fbbf0efd269a04f9153def688f8595ee378635920b9be14b1a871a227c2cf"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}]}, {0x658, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY={0x294, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xfa, 0x1, "cf49b77130b6fa89dfa0e803d5eb015aee26d2b348cfe3c29dd8bab7fc6d8b435bc29a3759a796d3e5959513684bc45cdbca966864c49256a3af4ca749f9f50a365d3fe1c25d62dff8333f88da2036c93d1d31dd835ff544aa3c229d3dd6cb0b5562dcc5efacf173f54d50f3d5c782c7346e42304ff86f18729dd6d27d1fa9fea745892d99036ed6b9925a557cf43822600811e8f3c3e61c7eb9fd99a42584e79526ad16d686d0c130e153e86409f7ccf7b3bfffbeab852f1836731c4375d07eede70c9d7dd183561cf194f27877f9a27ff294209c5eacb37efb7e6e645846038209d1292feeadaf7414733995c0b93e8010e76d7eaa"}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xf1, 0x1, "4daf69b8915f5fd8f3e7615f07e79d0408bb6e5c70ff88078d778c396659802b32d079f79ea1d96f9f2c7bdaa9955c96c0393dedb852a1f6b5dacbbbaeb4d0b4784e802cd605989fcc469596d0de47ede8c72bbecb94f578b99c2ea2cb9aade15a18ebf1179231e5796b057cbfdaaafe891781699fc432793d6420db0f1baa40af97f71bf5a59a52a9315593465156f2a47a45c7f7f6e3fd876c66a71460c4a2991f89d0a88ca090749059071bcb60fafb46780125e2c35cacd5a407b3c7dd9ef3d2182df5bc17c2833dfac0fb998ffd40c7f26ac28e1a1721f873418e3768f0784f0e8f8ad631fb9f0123f376"}]}, @NFTA_SET_ELEM_KEY_END={0x3b4, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x68, 0x1, "2e3cde8bd09bfb8761d48dae5bad8ea321f14202b87092a9056635a199dd1d16fde2a5ff700e188f52d29c1cf9199a7c92eed6127a2801bb03e3459484c098a9b9569dac91a31e3c36a93d12d8b9ac8f1c878e148b91776e8c33057c9a6148f361667eef"}, @NFTA_DATA_VALUE={0x81, 0x1, "db940990f0d043500592665ef15191a6c034ea0d9d6843b84dc8da22b9a332c9a05c89d58d6f976f41a33b045f557cd23534f2c1b0efb586f6454038c54c3ff56e1a8e79be176bc99cb59f837937406ff106ef528a48d6fdbef30a8aa11a8d559cf4f65e052464bebe98cb99e45c57f06bbd5379a3ace93053d047cc5b"}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xf5f3223fcccf76af}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xb2, 0x1, "2acb424a632bef580bb8d8a4fdff0b3a8a607c364a1cc7238726ad146bb33aae84f278b4996b68504d65d34f2b600999213804b3dc7a7eceb4882b320fbf3bb828d74288849acdb376d993f34e0c6162eecc4dde3fc39a229ebeff39235ba74d57b7e27e31880c92b1b500a0b0bc14dfa5ebc9b03db3ba6c25f526ce683850df38869ecdfccb0f42c71b424c9c0e37af1d64344ea7b3170b806361cdb1e2615a7c6a3d969926de5c133d4e0e3bcf"}, @NFTA_DATA_VALUE={0x5c, 0x1, "badfef6680807f6192b3af7f8812ed42f6ca7e4bb350f3e16012a0f7c0008a99491cc3ef9415842b53968474f910371e81c33694ee69bd8c830ed4652e0e2a6c1ee30494eea28c08689f221f6e6e3693326c259a7b74ee22"}, @NFTA_DATA_VALUE={0xbe, 0x1, "e8c9d877b681cf79450ca979996d827ec2e3b53a592ed5b3a92aefffbcca9f5436c9ba2cd2c6429ff77a105f4b1637897bbd01a455a08758baf5d26b491145986eb2c928d5d113cb56652983fe2213de81d3d58403d3e7eafef4a83eea210c6f23ab1be728900be8f57092b7ac6669edc1c76f31be440d3f827c6a5c2eaee45ceb5c8b9496a926237233b75961b052ca4d65a278fbe3664041f57d08561bb58e361e8ecb13f1c393643a7a8ed41adbd06c5ff75aa3e9910770b6"}]}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x49c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x9c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_KEY={0xc4, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xaf, 0x1, "2b1974dd88e2d2ddb981e18aec6f536435bd89838f15ccf09ca78bf994fe69a8e2ec6e148424bd17833776f6df3821d09b51cd9f6da19e42edff73cd3972913ba615578627e570f759480d82ba16c13f19bc4f7da0a88c283c9a99a1667a65512556add2970c67a79b5dc4a7c43415f68e6d7a06a580aa12b2c7c8deb8d5d8efdc6e60610f4e657cafb47a17dc7970e15b0236a5dd1f5431ccc68e8d726885df2c797542cd2ed0424d0180"}]}, @NFTA_SET_ELEM_DATA={0x54, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}, @NFTA_SET_ELEM_DATA={0x170, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xdd, 0x1, "a1c15d8c8abcea56bb075cdd6e29a23b8ea47dca084fa776927e0047244eac3b3e742ec551bb4a933b505acff819cdfea240074673ca0649cb7c3ea2bfee6964ac8cc34a4edfe9ea4a7a15ed5948801bb288561a2ba342978e87cb872e45fc84b75beff5d9af99cc2a5bd8d82040443e3ccf2efe737d102c1082839f5b22a43c46621df542274ecf2b68ac9d34c6cca2f5d768c86cefdbd0f6d408603440351e8b53bd4c6cd9fa1358da9e8a0f31ca430c5401f342c1cc2caf2dcece67e68e35482e0478ebbd9c563fc51425f23660a29c950c568bd6ba98bd"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x7ffffffffffffffa}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x59, 0x1, "dd52363a1a4703a36f6ce3dc2d1e0e1ff5c2520b6d1903404a31ca64bf07479a8bb26027b976f0c82612c4b63ce3f20aef5b239149ff61cd1d05177e660bd93ec52afdb30ea96152a00503a49be1d6ef72b7b72b46"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x100000001}, @NFTA_SET_ELEM_KEY={0x150, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x79, 0x1, "02c7c05f43cb631ab8b709178209030491ab5ae741b25aab86452148e4be05621d7094450a66afdddb44c40e7af170e64a75117aa2bd63324220da95b44b4f4a869389f4a97f6bfe67c650934834b80be4e31ac611df9258f91ae68a483be9c5ce1ca23a8d019e8881619b60564f98e0437d719906"}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x8000000000000005}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}, {0x1178, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY_END={0x78, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x57, 0x1, "5156305d9df9b3b5f4908d8656c187682790970ee949f0ee6bd8f55246011008392e628462c784bf0f078bbaa5856aa77ddc6f7f5669fb959785b66b963bbe06e0ab0d5e7d0d5fb4ae4d19f651b6e22327bae1"}]}, @NFTA_SET_ELEM_USERDATA={0x1004, 0x6, 0x1, 0x0, "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"}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0xde, 0x6, 0x1, 0x0, "2a58216937abafcaf9e02afac193560da66f7a61517372ccd80473e40ff4d34c53879e54a3b01a23c77cf4bcb3e3254b2e1e9a3267533b6f3dce375855fa4a74c2d5ea5ff9bd3b802865b3890599e2ae53703707ec9e4267d3944a4a193d5014046d18706e3cd309d8e5c66d59812040673158e7e2b01787ac4ea4e1d54c3d3235331887cdd3fa80dcbb933725c75d012de3e0c43c7bfd2e51401560ce3f53b4233cc0ad65dbdd26d11ccd73b277bf7ab57a18e190bd8c9fc4680596525815f8bad0be7e6415a3648cbf37d7aadfa77bbe4797507f19451e4656"}]}, {0x384, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x2a4, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x7f, 0x1, "9bc99ea08e2abf4a6a940054795a5ada314c8bd3b29cd909ddca5c4b44fabfd852e4066c9e354eb8433907243e987a7d695e156c97eab05be312d96e822a5aebb3d0fcd9b938843fb98088c8559124322649ec00ccca672dc955b5e60e4ee592b8fa63a4f7462d094e0689799fd66e257ed955c06003a58908d5ab"}, @NFTA_DATA_VALUE={0xec, 0x1, "6f0a58ea259c115935cda35fce2deb0bd72eda56ab668d49a86e1fd16354347d7e546267622b49ed6f884a92100e6609fbc7ebafbf32873abf0833fe712715dc800b6e9c912c014f1fa2e0e6fb0bc5bd9a98e1f85b4eedd6c318313a4c0a8e1b341c99a7afa1a3cc875ca38159ff25edac1408767bc1ced291376d0b2af54700161a10c118a8950a41842c280a00ea8352626cbf48c6754bdb335d6f8c142e184424f6837543a68c3f961750b1db842c3d84d8bb0358c644b5eb967e021c1794a8efd049ad83187a3077e452f4f48ca186070883c222076af5539a3bbd81a1aa05398bef41c9149c"}, @NFTA_DATA_VALUE={0x2c, 0x1, "0febda639b50a61127ea78014b0df5e31495f93ba633d3d07d8d7bbabba0dd38507986c4ad080548"}, @NFTA_DATA_VALUE={0x8b, 0x1, "851a5b09a509952e911aa35b8001c4191bd7170968de4e20a2e354aea0f98ee374be61d64102b38af127051c840922714e862b82f5f079aa709b04e7158dfb62073b72f616827a910fe3fb3b7aa5ed7d787e3fc233bbea6da1307e5e60bf816ade5a2c09cd70518373a9120fe7f205ac5ede1883c1c380ec9e3e7ab2d8b536a4e884b6659b33f2"}, @NFTA_DATA_VALUE={0x54, 0x1, "7285b58484cffed7c3890c26d9cf66c31640f6f82c9accc48d03f101229f1d9a222f2114f3ca018294eb3893145cb2c6ee6f29f3708f5540279633420c8d9c6b49ccf59598b3ed36d9eb27c84ba6def8"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x100}, @NFTA_SET_ELEM_USERDATA={0xcd, 0x6, 0x1, 0x0, "ec2075607ee68c4402e416164713abb741a4f5a6d55f95bfe4f910671013feae8f116d0cd5944dab315a381a9964529a3c3b2c0163b72f7b2fdbc731130e6e416e9b8c4ddb9e4782f53ab5b9ecca8ff2474a24f0d825f89d2ca3aa9a7751d2acfcbe1795224c98eb1deee6ab519178456428d0b91f11b5fae4d2171bf077d474bb998e2f601118a08e9954b99b31b0ad4251fd7d2b4e7839be4ef681add2c0139f031b716a38adcaa657c267989af51e1a46e0cc037fb2cff43054072e59165bf4e01c925504e1281f"}]}, {0x19c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x184, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xea, 0x1, "dff9b85768cfc9b9580ac3b0f8122c5d616b6fd7e67410681f6a4ec3b877ca02062965a30a4b881b4100a008f5637baf8114fca9e4084c3c31da886b73287ee4400893aff737b15204944d6246de81951629a95cb022a572ce3c0e9a6a75085d7ba67496a95c83278f47662f3677d2353688ad09ab9583d1f147bebaf4603a55e1e7aa10432c374172e4ebfcec53ba1e6a3f9bf8ada56fb39328e9b6649c65b5c530ec99bee8758fc650da1ca52b84441138bb1669db398d3ffd00f7b08a08dad0ad1d88a4274f1ca26d23a458d3770f3b31737539f3e4ff2650ffd5d3bf05de0b692b290616"}, @NFTA_DATA_VALUE={0x2b, 0x1, "e8b632507629c5dedc235ab48d382fdeb6a39c7ef4425bdbf8526d98fffee1438f14abd633c783"}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x25ac, 0x3, 0x0, 0x1, [{0x188, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_DATA={0x178, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x74, 0x1, "6147d2d881d9e1608d1548a78e3c738c6796de9aef48fb806b9c84fe66a62152a2573d5e141aab95b46dc849ac9d07d85d1720d36b35d1d34dbded68e25277f686190fb168d64abc584af8a2d64305710d97f5f814d18901f3c96de503ae9795d1f52fb1ee9f48ac4132410c40f94e6d"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x4d, 0x1, "fa6fd21df9d7455bd5c18b2aaabe1cdf52956cb60fe662eaf1a00d944b9558819daadfa4feffe3fa5bb0ab4d404dc57d2b14ce39b6fd6530b09f8929707957b27e02627d05201062de"}, @NFTA_DATA_VALUE={0x59, 0x1, "4ccb78170e2246bcd104435526a707ae391e2975d5e1c6d8ac78df3a8b6c6f73283f435d87d4b7ae8684bec1dc22702dceeda077060ba456001021488fc38c1bdcc5c52195132c616ce18fba3b60fcbe54478dcb62"}]}]}, {0x1080, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_DATA={0x58, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_KEY_END={0x1008, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1004, 0x1, "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"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}, {0x25c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xffffffffffffffe1}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_USERDATA={0xae, 0x6, 0x1, 0x0, "346678139f107985133e38288466df8415f300c36bf54f243c5d2ee7bb1300a4e9ea567cbf46dc2b7e37402dd89211ec4a5e9cdd0441cf0c2b5dc2d637c7e1823f5f9236382854bfa4b2d1a2a2b3eed52c325f1063b451afe0cb9e97349b8a186c6ceb8c987a902a8a9d00cfacdc95ea41f7ff46f879f6ee8a9b86a8e4ffd4fe67fcc8898be8d7e2adfcfd618eddef41d8bdd4281b858d075ec5153592005553546a4709bdc2e1999b66"}, @NFTA_SET_ELEM_DATA={0x174, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa7, 0x1, "46c587b607988246c9349cbd576fda0bb77484fba3f8050f1d246006161ae995dfd0f7bdc767e3dcda86a96f6ea4d59d8e5a87bb3dfc67e0fe98192a1dcab63a8acd9dd3e4b2103a7d5b06911077a0a2388717dbe7ed38c9338a401742381ccb488ddb8a80c4d1bcf38126813d5e71454302b101820f99c15ae0ae115dc99f77e14011cee992ead2c784283eb965acfb716a7e374a4ea585044ea665543aae22e0bf45"}, @NFTA_DATA_VALUE={0x23, 0x1, "adc53cf99bdb17d7a674a8989ac868f643689560fbd7ff04ee26f0f64063ec"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x58, 0x1, "66baee1259da03105e1e6ded0b6efc737ff005f6f0ecd0d586c581ffda2bfc42d6aa632c16885ed31a3963dd70a1aad582cd7f78e58d9083cc7bbae1d4d2222979f274f14150b97dce0f2a9179174e3ba7dc3354"}]}]}, {0x1144, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0x7a, 0x6, 0x1, 0x0, "adb02d0359dd09784ff5db2d1b5de2161fb58a64031d4c91b554231088a126367fd0bf4d139feb361cd83f5b2d7db30e3ce98f1c3c1331b3c95c75067353d59c6d0c18241a1358047f07ba85e52604d348a9656d2734c1da26edd1787fc37ea9969d6c08d7705a7655f56ae61a8be267b2f7e04c1bbe"}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_USERDATA={0x1004, 0x6, 0x1, 0x0, "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"}, @NFTA_SET_ELEM_USERDATA={0xa9, 0x6, 0x1, 0x0, "a27d0415040bae613c59999faba76355f9813361181b2440e40b5935839e792fb3181191721a28b40070035b6e50d5a334fc76d1d2d3325a7792cefa867d6d4d39b8691355ed9ff1aac87ead462dfd763c9838a7760563d6bd258b679b4bc4558c2dc89314ee053decfba6244ead0beabeb5d1298a058c68eecd507fb1e6cf9b0bd1e8826e790ad34b282543d0ee717030d22adc4f24709f6b9685f93822243ee260b3818d"}, @NFTA_SET_ELEM_USERDATA={0x4}]}]}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x4c88}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 10:50:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) [ 157.332598][ T7261] loop2: detected capacity change from 0 to 1 10:50:50 executing program 2: syz_read_part_table(0x48, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 157.435826][ T7293] loop2: detected capacity change from 0 to 1 10:50:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x15, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x9, 0x0, 0x0) 10:50:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="840000000201010300000000000000000a0000082c001080080001400000040108000340000f007f080002400000000608000140ffffff67080001400000db2920000280040003"], 0x84}}, 0x0) 10:50:50 executing program 4: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, r0/1000+60000}) 10:50:50 executing program 2: syz_read_part_table(0x4c, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) [ 158.135668][ T25] audit: type=1326 audit(1624359050.932:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7304 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 158.167242][ T7311] loop2: detected capacity change from 0 to 1 [ 158.176436][ T7317] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) [ 158.184662][ T25] audit: type=1326 audit(1624359050.982:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7304 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4193eb code=0x0 [ 158.211725][ T7317] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 10:50:51 executing program 3: fspick(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 10:50:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xa, 0x0, 0x0) 10:50:51 executing program 3: getresuid(&(0x7f0000000780), &(0x7f00000007c0), 0x0) 10:50:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) [ 158.241064][ T25] audit: type=1326 audit(1624359051.042:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7326 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xb, 0x0, 0x0) 10:50:51 executing program 2: syz_read_part_table(0x55, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:51 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/cgroup\x00') ioctl$NS_GET_PARENT(r0, 0x4030582a, 0x0) [ 158.345459][ T7352] loop2: detected capacity change from 0 to 1 10:50:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x4, &(0x7f0000000000)=0x1, 0x4) 10:50:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) 10:50:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1c, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xc, 0x0, 0x0) 10:50:51 executing program 2: syz_read_part_table(0x68, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xd, 0x0, 0x0) 10:50:51 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f000000d6c0), 0x0, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) syz_io_uring_complete(r1) 10:50:51 executing program 4: socketpair(0x11, 0x2, 0x0, &(0x7f0000000480)) [ 159.027224][ T25] audit: type=1326 audit(1624359051.832:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7374 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 159.034725][ T7378] loop2: detected capacity change from 0 to 1 10:50:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:51 executing program 3: fsopen(&(0x7f0000000000)='bpf\x00', 0x0) 10:50:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000080)={"4f387acb73a1b51b3a5d586f0ba163a4"}) 10:50:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xe, 0x0, 0x0) 10:50:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 159.145260][ T7378] loop2: detected capacity change from 0 to 1 10:50:52 executing program 4: getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) 10:50:52 executing program 2: syz_read_part_table(0x6c, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x40049409, 0x0) 10:50:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xf, 0x0, 0x0) 10:50:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x21, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 159.180010][ T25] audit: type=1326 audit(1624359051.982:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7412 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:52 executing program 4: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, 0x0, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 10:50:52 executing program 3: socketpair(0xa, 0x2, 0x0, &(0x7f0000000480)) [ 159.307780][ T7448] loop2: detected capacity change from 0 to 1 10:50:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:52 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, 0x0) 10:50:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x24, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x10, 0x0, 0x0) 10:50:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)={0x2c, 0x3, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @loopback}}}]}]}, 0x2c}}, 0x0) 10:50:52 executing program 2: syz_read_part_table(0x74, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x25, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000000), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5452, &(0x7f0000000040)) 10:50:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x28, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:52 executing program 4: socket(0x10, 0x2, 0xfc) 10:50:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2c, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xfe, 0x0, 0x0) [ 160.048652][ T7467] loop2: detected capacity change from 0 to 1 [ 160.129804][ T7467] loop2: detected capacity change from 0 to 1 10:50:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:53 executing program 4: fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) 10:50:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2d, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x500, 0x0, 0x0) 10:50:53 executing program 3: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 10:50:53 executing program 2: syz_read_part_table(0x7a, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:53 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$join(0x1, 0x0) 10:50:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x30, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:53 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x50}}, 0x0) 10:50:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000040)={'veth0_to_bond\x00', @ifru_addrs=@l2={0x1f, 0x0, @none}}) 10:50:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xe100, 0x0, 0x0) 10:50:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x34, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 160.933874][ T7526] loop2: detected capacity change from 0 to 1 [ 161.017023][ T7526] loop2: detected capacity change from 0 to 1 10:50:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0xc, &(0x7f0000000000), 0x4) 10:50:54 executing program 3: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x18f801, 0x0) 10:50:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xee00, 0x0, 0x0) 10:50:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x35, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:54 executing program 2: syz_read_part_table(0x90, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:54 executing program 3: syz_io_uring_complete(0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:50:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3c, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:54 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000028c0)={[{@size={'size', 0x3d, [0x32, 0x2d, 0x6d, 0x39]}}]}) 10:50:54 executing program 3: socketpair(0x10, 0x0, 0x4, &(0x7f0000002d00)) 10:50:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xfffe, 0x0, 0x0) [ 161.778948][ T7578] loop2: detected capacity change from 0 to 1 10:50:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 161.847923][ T7593] tmpfs: Bad value for 'size' [ 161.857896][ T7593] tmpfs: Bad value for 'size' [ 161.889085][ T7578] loop2: detected capacity change from 0 to 1 10:50:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="68010000040101"], 0x168}}, 0x0) 10:50:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x44, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:55 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000028c0)) 10:50:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xfffffffe, 0x0, 0x0) 10:50:55 executing program 2: syz_read_part_table(0xfe, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x45, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:55 executing program 4: sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000680)={0x1, &(0x7f0000000640)=[{}]}) 10:50:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000000), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0xc0189436, &(0x7f0000000040)) 10:50:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xffff8881026a83a8, 0x0, 0x0) [ 162.625470][ T7618] loop2: detected capacity change from 0 to 1 [ 162.651515][ T7630] netlink: 340 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x48, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="68010000400101"], 0x168}}, 0x0) [ 162.737013][ T7618] loop2: detected capacity change from 0 to 1 10:50:56 executing program 3: socket$inet6(0xa, 0x2, 0x5) 10:50:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4c, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8903, 0x0) 10:50:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0xfffffffffffffffe, 0x0, 0x0) 10:50:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:56 executing program 2: syz_read_part_table(0x204, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="8400000006010103"], 0x84}}, 0x0) 10:50:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x24, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_QUEUE_MAXLEN={0x8}]}, 0x24}}, 0x0) 10:50:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4d, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 163.515060][ T7676] loop2: detected capacity change from 0 to 1 10:50:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:50:56 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000600), 0x511201, 0x0) 10:50:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x50, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:56 executing program 3: io_uring_setup(0x0, &(0x7f0000000880)) [ 163.564417][ T7692] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.4'. 10:50:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x54, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:56 executing program 3: syz_open_dev$vcsa(&(0x7f000000d6c0), 0xffffffeffffffffb, 0xb30980) 10:50:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x2, 0x0) [ 163.622059][ T7676] loop2: detected capacity change from 0 to 1 10:50:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @local}, @qipcrtr, @ipx={0x4, 0x0, 0x0, "fae08f92f62b"}}) 10:50:57 executing program 2: syz_read_part_table(0x300, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5c, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:57 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000080)=':\x00', &(0x7f00000000c0)='./file0\x00', r0) 10:50:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x3, 0x0) 10:50:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x60, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:57 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000100)) 10:50:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x44, 0x1, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x14, 0x4, @private0}}}]}]}, 0x44}}, 0x0) 10:50:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x61, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x4, 0x0) [ 164.393659][ T7753] loop2: detected capacity change from 0 to 1 10:50:57 executing program 4: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x1}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x7fffffff]}, 0x8}) [ 164.481726][ T7753] loop2: detected capacity change from 0 to 1 10:50:58 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x9, 0x0) 10:50:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x64, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:58 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4000, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:50:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x5, 0x0) 10:50:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:58 executing program 2: syz_read_part_table(0x402, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6c, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x24, r1, 0xbd88d3c0882ecbc7, 0x0, 0x0, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x24}}, 0x0) 10:50:58 executing program 4: r0 = socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000300)={0x14}, 0x14}}, 0x8c0) [ 165.253949][ T7800] loop2: detected capacity change from 0 to 2 10:50:58 executing program 2: syz_read_part_table(0x406, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x74, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x6, 0x0) 10:50:58 executing program 3: remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x100000b, 0x0, 0x0) 10:50:58 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x3}]}) pipe2(&(0x7f0000000680), 0x0) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) 10:50:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7c, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1, &(0x7f00000003c0)={0x1, &(0x7f0000000040)=[{0x6}]}) [ 165.370127][ T7838] loop2: detected capacity change from 0 to 2 [ 165.409881][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 165.409890][ T25] audit: type=1326 audit(1624359058.212:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7850 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 165.453898][ T25] audit: type=1326 audit(1624359058.252:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7856 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 165.494769][ T25] audit: type=1326 audit(1624359058.292:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7856 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4193eb code=0x0 10:50:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:58 executing program 2: syz_read_part_table(0x500, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x7, 0x0) 10:50:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x84, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:58 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000001400), 0x0, &(0x7f0000001480)) 10:50:58 executing program 3: syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x101100) 10:50:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x87, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:58 executing program 3: r0 = socket(0x2b, 0x1, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 10:50:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x8, 0x0) [ 166.135014][ T7877] loop2: detected capacity change from 0 to 2 [ 166.229509][ T25] audit: type=1326 audit(1624359059.032:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7850 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:50:59 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f0000000240)={[0x6]}, 0x8}) 10:50:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x94, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:59 executing program 3: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x30040) 10:50:59 executing program 2: syz_read_part_table(0x600, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x9, 0x0) 10:50:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="fc010000", @ANYRES16, @ANYBLOB="01"], 0x1fc}}, 0x0) 10:50:59 executing program 4: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000280), 0x202) 10:50:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:50:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9c, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:59 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)) 10:50:59 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000080)) 10:50:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa4, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 167.003037][ T7934] loop2: detected capacity change from 0 to 3 10:50:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x1c, r1, 0xbd88d3c0882ecbc7, 0x0, 0x0, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x1c}}, 0x0) 10:50:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xa, 0x0) 10:50:59 executing program 2: syz_read_part_table(0x604, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:50:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="fc010000", @ANYRES16=r1, @ANYBLOB="010028bd7000ffdbdf25140000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b000100000006001100ff0700000800150040000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000600000006001100010000000800150005000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00de00000006001100060000000800150000000000080001007063690011000200303030303a30303a31302e30000000000800030003000054ef000b"], 0x1fc}}, 0x0) 10:50:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xac, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:50:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002fc0)={0x0}}, 0x0) 10:50:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xb1, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 167.134906][ T7975] loop2: detected capacity change from 0 to 3 [ 167.215453][ T7975] loop2: detected capacity change from 0 to 3 10:51:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x22c, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xb, 0x0) 10:51:00 executing program 4: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, 0x0) 10:51:00 executing program 3: r0 = socket(0x0, 0x3, 0x2) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000100)={0x0, 0xffffffffffffff11, &(0x7f00000000c0)={0x0}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x6, 0x81, 0x89, 0x3}]}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) pipe2(&(0x7f0000000440), 0xc4800) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) 10:51:00 executing program 2: syz_read_part_table(0x700, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x300, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:00 executing program 4: r0 = socket(0x29, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) 10:51:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x500, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xc, 0x0) 10:51:00 executing program 2: syz_read_part_table(0x900, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x3}]}) [ 167.881094][ T8008] loop2: detected capacity change from 0 to 3 [ 167.903307][ T25] audit: type=1326 audit(1624359060.702:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8000 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 167.970916][ T25] audit: type=1326 audit(1624359060.772:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8034 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 168.010137][ T8042] loop2: detected capacity change from 0 to 4 10:51:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x600, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xd, 0x0) 10:51:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept(r0, 0x0, 0x0) [ 168.705811][ T25] audit: type=1326 audit(1624359061.512:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8000 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:01 executing program 3: syz_open_dev$evdev(&(0x7f00000005c0), 0x0, 0x10000) 10:51:01 executing program 2: syz_read_part_table(0xa00, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x700, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:01 executing program 4: syz_open_dev$evdev(&(0x7f0000000000), 0x100000000, 0x101040) 10:51:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xe, 0x0) 10:51:01 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000080)=""/155) 10:51:01 executing program 4: syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x1c9001) 10:51:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x900, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 168.833189][ T8083] loop2: detected capacity change from 0 to 5 10:51:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xf, 0x0) 10:51:02 executing program 2: syz_read_part_table(0xb00, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000840), 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 10:51:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:02 executing program 4: syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x7283c40d4603e3e8) 10:51:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1400, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000840), 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80086601, 0x0) 10:51:02 executing program 4: syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x40040) 10:51:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1500, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 169.633440][ T8116] loop2: detected capacity change from 0 to 5 10:51:02 executing program 4: syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x4001) 10:51:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1600, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x10, 0x0) 10:51:03 executing program 3: syz_open_dev$evdev(&(0x7f0000000080), 0x7, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) syz_open_dev$evdev(&(0x7f00000017c0), 0x8, 0x4002) 10:51:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1c00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:03 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000840), 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000012c0)=""/105) 10:51:03 executing program 2: syz_read_part_table(0xc00, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:03 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000001480), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40086602, &(0x7f0000000a40)={0x16, 0x0, 0x0}) 10:51:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:03 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@l2tp={0x2, 0x0, @multicast2}, 0x80) [ 170.479514][ T8166] loop2: detected capacity change from 0 to 6 10:51:03 executing program 2: syz_read_part_table(0xd00, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x11, 0x0) [ 170.596338][ T8200] loop2: detected capacity change from 0 to 6 10:51:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r2, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe2, 0x4) 10:51:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x9700) 10:51:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006b80)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="140000000000000001"], 0x18}}], 0x2, 0x0) 10:51:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2100, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x12, 0x0) 10:51:04 executing program 2: syz_read_part_table(0xe00, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2400, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2500, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:04 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'ip6_vti0\x00', 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 10:51:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2800, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 171.355174][ T8221] loop2: detected capacity change from 0 to 7 10:51:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r2, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe2, 0x4) 10:51:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xda, 0x0) 10:51:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x6c000000, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x801, 0x6c, 0x87400, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x233c0009}]}]}, 0x50}, 0x1, 0x40afc}, 0x0) 10:51:04 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) 10:51:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2c00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x38, 0xb, 0x6, 0x801, 0x6c, 0x87400, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x2, 0x1, 0x0, @remote}}]}]}, 0x38}, 0x1, 0x40afc}, 0x0) [ 171.459403][ T8221] loop2: detected capacity change from 0 to 7 10:51:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xef, 0x0) 10:51:04 executing program 2: syz_read_part_table(0xf00, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:04 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x267af417aa859a7e) 10:51:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r2, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe2, 0x4) 10:51:04 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f0000000980), 0xffffffffffffffff) 10:51:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000700)={&(0x7f0000000040)={0xa, 0x4e21, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@hopopts={{0x18}}], 0x18}, 0x0) 10:51:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xfe, 0x0) 10:51:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2c02, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000000a40)={0x1054, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @val={0xc}}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0xfffffe00}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x10001}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0xf6}, @NL80211_ATTR_VENDOR_DATA={0x1004, 0xc5, "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"}, @NL80211_ATTR_VENDOR_ID={0x8}]}, 0x1054}}, 0x4000800) 10:51:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2d00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) [ 171.612472][ T8297] loop2: detected capacity change from 0 to 7 10:51:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x204, 0x0) 10:51:04 executing program 2: syz_read_part_table(0x1100, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:04 executing program 3: io_setup(0x3, &(0x7f0000000000)=0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x4, &(0x7f00000016c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) 10:51:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:04 executing program 4: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 10:51:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3400, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x300, 0x0) 10:51:04 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) signalfd(r0, &(0x7f00000077c0), 0x8) [ 171.717631][ T8323] loop2: detected capacity change from 0 to 8 [ 171.825651][ T8323] loop2: detected capacity change from 0 to 8 10:51:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3500, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:05 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x81, 0x0) read$char_usb(r0, 0x0, 0xffc1) 10:51:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x402, 0x0) 10:51:05 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, 0x0) 10:51:05 executing program 2: syz_read_part_table(0x1200, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3c00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:05 executing program 4: statx(0xffffffffffffffff, 0x0, 0x802, 0x0, 0x0) 10:51:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14, r1, 0x11, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 10:51:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x406, 0x0) 10:51:05 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f0000000680), 0xffffffffffffffff) [ 172.522801][ T8367] loop2: detected capacity change from 0 to 9 10:51:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:06 executing program 2: syz_read_part_table(0x19a3, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:06 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000380)={0x6c, r0, 0xcd, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xffc6}, @NL802154_ATTR_PID, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x6c}}, 0x0) 10:51:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x500, 0x0) 10:51:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, 0x0, &(0x7f0000000340)) 10:51:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4400, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:06 executing program 4: gettid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f000000ab80)={0x0, 0x0, &(0x7f000000aa80)=[{&(0x7f0000007fc0)={0x1c, 0x11, 0x1, 0x0, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x1c}], 0x1, 0x0, 0x0, 0x20008080}, 0x20000000) 10:51:06 executing program 2: syz_read_part_table(0x2000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x600, 0x0) [ 173.368089][ T8414] loop2: detected capacity change from 0 to 12 10:51:06 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000011c0)='./cgroup/syz0\x00', 0x200002, 0x0) 10:51:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4500, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 173.484655][ T8452] loop2: detected capacity change from 0 to 16 [ 173.556872][ T8452] loop2: detected capacity change from 0 to 16 10:51:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x410c}}}, 0x1c}}, 0x0) 10:51:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x18, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x4}]}, 0x18}}, 0x0) 10:51:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4800, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x604, 0x0) 10:51:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:07 executing program 2: syz_read_part_table(0x2500, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4c00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000740)={&(0x7f0000000340)=@abs, 0x6e, 0x0}, 0x1) 10:51:07 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280), 0xffffffffffffffff) 10:51:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x700, 0x0) [ 174.251270][ T8481] loop2: detected capacity change from 0 to 18 10:51:07 executing program 2: syz_read_part_table(0x3f00, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4d00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:07 executing program 3: pipe(&(0x7f0000000340)={0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) 10:51:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:07 executing program 4: sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="cd00000000000000000014"], 0x30}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 10:51:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="cd"], 0x30}}, 0x0) [ 174.359460][ T8514] loop2: detected capacity change from 0 to 31 [ 174.466387][ T8514] loop2: detected capacity change from 0 to 31 10:51:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5400, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x900, 0x0) 10:51:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4107}}}, 0x1c}}, 0x0) 10:51:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r0) 10:51:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:07 executing program 2: syz_read_part_table(0x4000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:07 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, 0x0, 0x0) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) 10:51:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5c00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:07 executing program 3: unshare(0x10900) 10:51:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xa00, 0x0) 10:51:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 175.134488][ T8569] loop2: detected capacity change from 0 to 32 10:51:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 10:51:08 executing program 2: syz_read_part_table(0x4800, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:08 executing program 3: setreuid(0xee01, 0xee00) r0 = geteuid() setreuid(0xee00, r0) 10:51:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xb00, 0x0) 10:51:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6100, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 175.270802][ T8616] loop2: detected capacity change from 0 to 36 10:51:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x5460, 0x0) 10:51:08 executing program 4: pselect6(0x2a, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x0) 10:51:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6400, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xc00, 0x0) 10:51:08 executing program 2: syz_read_part_table(0x4c00, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0xf, 0x0, 0x0) 10:51:08 executing program 4: socketpair(0x11, 0x3, 0x7, &(0x7f0000000380)) 10:51:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6c00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) 10:51:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={[{@nojoliet}, {@mode}, {@check_relaxed}]}) [ 175.991143][ T8643] loop2: detected capacity change from 0 to 38 10:51:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xd00, 0x0) [ 176.071627][ T8643] loop2: detected capacity change from 0 to 38 [ 176.087880][ T8668] ISOFS: Unable to identify CD-ROM format. [ 176.122217][ T8668] ISOFS: Unable to identify CD-ROM format. 10:51:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7400, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:09 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000640)={0x2, {{0x2, 0x0, @multicast2}}}, 0x90) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) syz_read_part_table(0x0, 0x0, 0x0) 10:51:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xe00, 0x0) 10:51:09 executing program 2: syz_read_part_table(0x5500, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8983, 0x0) 10:51:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7c00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:09 executing program 4: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0x0) 10:51:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xf00, 0x0) 10:51:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8100, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:09 executing program 4: syz_io_uring_setup(0x7d01, &(0x7f0000000040)={0x0, 0x833a}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x2fa6, &(0x7f00000002c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000340), &(0x7f0000000380)) [ 176.881845][ T8703] loop2: detected capacity change from 0 to 42 10:51:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x1100, 0x0) [ 176.984450][ T8703] loop2: detected capacity change from 0 to 42 10:51:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8400, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x5451, 0x0) 10:51:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$inet_MCAST_MSFILTER(r1, 0x11, 0x66, &(0x7f0000000000)={0x0, {{0x2, 0x0, @remote}}}, 0x90) 10:51:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x1200, 0x0) 10:51:10 executing program 2: syz_read_part_table(0x6800, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:10 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20000000, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") 10:51:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8700, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x2b, 0x0, 0x0) [ 177.739241][ T8754] loop2: detected capacity change from 0 to 52 10:51:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x2000, 0x0) 10:51:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9400, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:10 executing program 2: syz_read_part_table(0x6c00, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 177.854413][ T8792] loop2: detected capacity change from 0 to 54 10:51:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:11 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f00000031c0)='/proc/slabinfo\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x9}, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) 10:51:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x6, 0x0, 0x0) 10:51:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9c00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x3f00, 0x0) 10:51:11 executing program 2: syz_read_part_table(0x7400, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:11 executing program 4: syz_mount_image$vfat(&(0x7f0000004540), &(0x7f0000004580)='./file0\x00', 0x0, 0x0, &(0x7f0000004940), 0x0, &(0x7f0000004a00)={[{@fat=@dmask={'dmask', 0x3d, 0x1000000000}}]}) 10:51:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa400, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:11 executing program 2: syz_read_part_table(0x7a00, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xac00, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 178.597950][ T8813] loop2: detected capacity change from 0 to 58 10:51:11 executing program 3: getresuid(&(0x7f0000000240), 0x0, &(0x7f00000002c0)) 10:51:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x4000, 0x0) [ 178.714048][ T8853] loop2: detected capacity change from 0 to 61 10:51:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:12 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 10:51:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xb100, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:12 executing program 3: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 10:51:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xda00, 0x0) 10:51:12 executing program 2: syz_read_part_table(0x9000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xff7f, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:12 executing program 3: mincore(&(0x7f0000ff5000/0x4000)=nil, 0x4000, &(0x7f0000000500)=""/181) 10:51:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x100000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:12 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) 10:51:12 executing program 2: syz_read_part_table(0xa319, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 179.488553][ T8876] loop2: detected capacity change from 0 to 72 10:51:12 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0x1c, 0x1c, 0x3}, 0x1c) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) [ 179.604763][ T8908] loop2: detected capacity change from 0 to 81 10:51:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xef00, 0x0) 10:51:13 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000003e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003cc0)=[@cred], 0x60}, 0x88) 10:51:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x101cbd, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:13 executing program 3: fstat(0xffffffffffffff9c, 0x0) 10:51:13 executing program 2: syz_read_part_table(0xfeff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:13 executing program 4: msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) mincore(&(0x7f0000ff5000/0x4000)=nil, 0x4000, &(0x7f0000000500)=""/181) 10:51:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x200000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:13 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000003e00)={&(0x7f0000000080)=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000003cc0)=[@cred, @cred], 0xc0}, 0x88) [ 180.363715][ T8930] loop2: detected capacity change from 0 to 127 10:51:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x800000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:13 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x3, 0x0, 0x1000}, {0x0, 0x5, 0x800}], 0x2) 10:51:13 executing program 2: syz_read_part_table(0xff0f, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 180.457355][ T8959] loop2: detected capacity change from 0 to 127 10:51:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:14 executing program 3: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) 10:51:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xfeff, 0x0) 10:51:14 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f0000003e00)={&(0x7f0000000080)=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000003cc0)=[@cred, @cred], 0xc0}, 0x0) 10:51:14 executing program 2: syz_read_part_table(0xfffe, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:14 executing program 4: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 10:51:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:14 executing program 3: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 10:51:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xff0f, 0x0) [ 181.230157][ T8975] loop2: detected capacity change from 0 to 127 10:51:14 executing program 2: syz_read_part_table(0x20000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:14 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0x1c, 0x1c, 0x3}, 0x1c) munlockall() munmap(&(0x7f0000fec000/0x13000)=nil, 0x13000) [ 181.349452][ T9013] loop2: detected capacity change from 0 to 256 10:51:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:14 executing program 3: poll(&(0x7f0000000b80)=[{}], 0x1, 0x0) 10:51:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cubic\x00', 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000180)='htcp\x00', 0x5) 10:51:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xfffe, 0x0) 10:51:14 executing program 2: syz_read_part_table(0x80000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:14 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0x1c, 0x1c, 0x3}, 0x1c) 10:51:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 10:51:14 executing program 3: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) [ 182.087769][ T9029] loop2: detected capacity change from 0 to 1024 10:51:14 executing program 2: syz_read_part_table(0x80040, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x20000, 0x0) [ 182.200523][ T9064] loop2: detected capacity change from 0 to 1024 10:51:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:15 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000180)=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000000980)}, 0x0) 10:51:15 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x4}], 0x2) 10:51:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x26d52, 0x0) 10:51:15 executing program 2: syz_read_part_table(0x900000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:15 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x39, &(0x7f0000000080), 0x4) 10:51:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:51:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x26d5e, 0x0) [ 182.982963][ T9088] loop2: detected capacity change from 0 to 18432 10:51:15 executing program 2: syz_read_part_table(0x1000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:15 executing program 3: socketpair(0x23, 0x0, 0x0, &(0x7f0000000240)) [ 183.102813][ T9118] loop2: detected capacity change from 0 to 32768 10:51:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:16 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$wireguard(&(0x7f0000001c80), 0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000001e00)='ns/pid_for_children\x00') 10:51:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000000440)) 10:51:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x40000, 0x0) 10:51:16 executing program 2: syz_read_part_table(0x2000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:16 executing program 3: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) 10:51:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:16 executing program 3: syz_genetlink_get_family_id$team(&(0x7f0000001540), 0xffffffffffffffff) 10:51:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x200000, 0x0) [ 183.852957][ T9145] loop2: detected capacity change from 0 to 65536 10:51:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:16 executing program 2: syz_read_part_table(0x2040000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 183.975128][ T9184] loop2: detected capacity change from 0 to 66048 10:51:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, 0x0, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:17 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {}, {0x10, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) 10:51:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000180)="d0", 0x1}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 10:51:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xda0000, 0x0) 10:51:17 executing program 2: syz_read_part_table(0x3000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x1000000, 0x0) 10:51:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000c00)={0x28, 0xe, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}}, 0x0) [ 184.715319][ T9201] loop2: detected capacity change from 0 to 98304 10:51:17 executing program 2: syz_read_part_table(0x4000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x15000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x2000000, 0x0) [ 184.832248][ T9240] loop2: detected capacity change from 0 to 131072 10:51:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, 0x0, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x16000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:18 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) ptrace$setregs(0xf, r0, 0x9, 0x0) 10:51:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x2040000, 0x0) 10:51:18 executing program 2: syz_read_part_table(0x5000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:18 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0xc4080, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 10:51:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000002c40)={0x1, &(0x7f0000002c00)=[{0x0, 0x0, 0x0, 0x6}]}) 10:51:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1c000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x3000000, 0x0) [ 185.592580][ T9260] loop2: detected capacity change from 0 to 163840 10:51:18 executing program 2: syz_read_part_table(0x6000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:18 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 10:51:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 185.734936][ T9281] loop2: detected capacity change from 0 to 196608 10:51:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, 0x0, 0xc4fc9e906872338b, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:19 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) syz_io_uring_setup(0x10f8, &(0x7f0000000000), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x11a1, &(0x7f0000000100), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 10:51:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x4000000, 0x0) 10:51:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x20000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:19 executing program 2: syz_read_part_table(0x6040000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0xaf6}]}) 10:51:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x21000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:19 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x14, r1, 0x331, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 10:51:19 executing program 4: syz_genetlink_get_family_id$l2tp(0xfffffffffffffffc, 0xffffffffffffffff) 10:51:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x24000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 186.468006][ T9314] loop2: detected capacity change from 0 to 197120 10:51:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x5000000, 0x0) 10:51:19 executing program 2: syz_read_part_table(0x7000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 186.597957][ T9349] loop2: detected capacity change from 0 to 229376 10:51:20 executing program 4: syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 10:51:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x25000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:20 executing program 3: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4) 10:51:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x6000000, 0x0) 10:51:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0x0, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:20 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000c80), 0xffffffffffffffff) 10:51:20 executing program 3: sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) [ 187.337026][ T9370] loop2: detected capacity change from 0 to 262144 10:51:20 executing program 2: syz_read_part_table(0x9000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x28000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x6040000, 0x0) 10:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={0x0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f0000000e00)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d80)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 10:51:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14}, 0x14}}, 0x0) [ 187.472871][ T9395] loop2: detected capacity change from 0 to 264192 10:51:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2c000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:20 executing program 2: syz_read_part_table(0xa000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x7000000, 0x0) [ 187.596736][ T9420] loop2: detected capacity change from 0 to 264192 10:51:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0x0, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000dc0)={0x0, @nfc, @vsock={0x28, 0x0, 0x0, @my=0x1}, @hci}) 10:51:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2c020000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:21 executing program 3: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/208) 10:51:21 executing program 2: syz_read_part_table(0xb000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x8000000, 0x0) 10:51:21 executing program 4: ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'geneve1\x00'}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) 10:51:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x9000000, 0x0) 10:51:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2d000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:21 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), 0xffffffffffffffff) pipe2$9p(&(0x7f0000001000), 0x0) [ 188.261884][ T9441] loop2: detected capacity change from 0 to 264192 10:51:21 executing program 4: syz_open_dev$loop(&(0x7f0000000080), 0x7fff, 0x0) 10:51:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x30000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xa000000, 0x0) 10:51:21 executing program 2: syz_read_part_table(0xc000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x34000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:21 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000002, 0x10, r0, 0x0) 10:51:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, 0x0) 10:51:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0x0, 0x20000, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:21 executing program 4: r0 = fork() syz_open_procfs$userns(r0, 0x0) 10:51:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x35000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000018c0)={@local}) 10:51:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_TIMEOUT={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}}, 0x0) [ 189.138214][ T9501] loop2: detected capacity change from 0 to 264192 10:51:22 executing program 2: syz_read_part_table(0xd000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x20400) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 10:51:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xb000000, 0x0) 10:51:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3c000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:22 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x4800, 0x0) 10:51:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{}]}) msgctl$IPC_RMID(0x0, 0x0) 10:51:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 189.302775][ T9528] loop2: detected capacity change from 0 to 264192 10:51:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:22 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:51:22 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)) 10:51:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xc000000, 0x0) 10:51:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x40000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:22 executing program 2: syz_read_part_table(0xe000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x44000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:22 executing program 3: open$dir(&(0x7f00000000c0)='./file0\x00', 0x24440, 0x0) [ 189.998655][ T25] audit: type=1326 audit(1624359082.805:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9555 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 190.031267][ T9565] loop2: detected capacity change from 0 to 264192 10:51:22 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000002740), 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) 10:51:22 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/power/pm_trace', 0x88642, 0x0) 10:51:22 executing program 2: syz_read_part_table(0xf000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x45000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 190.163843][ T9592] loop2: detected capacity change from 0 to 264192 10:51:23 executing program 3: r0 = epoll_create(0x7fff) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) [ 190.822999][ T25] audit: type=1326 audit(1624359083.635:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9555 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000006c0)={0x0, @in={0x2, 0x0, @multicast1}, @isdn, @ipx={0x4, 0x0, 0xfffff9e1, "9102c7bd00"}}) 10:51:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xd000000, 0x0) 10:51:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x48000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:23 executing program 2: syz_read_part_table(0x10000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bridge0\x00') 10:51:23 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000580)) 10:51:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4c000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) sysfs$1(0x1, &(0x7f0000000040)='bpf\x00\xf8\xc7\xf7M(4\x19\xac\xc4\xda\xdc\xbb\x93\x9f}s\xa4>\xfd\x8b') [ 190.919017][ T9614] loop2: detected capacity change from 0 to 264192 10:51:23 executing program 2: syz_read_part_table(0x11000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xe000000, 0x0) 10:51:23 executing program 4: openat$ptp0(0xffffffffffffff9c, &(0x7f00000001c0), 0x824bc1, 0x0) 10:51:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4d000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:23 executing program 3: getpgrp(0x0) fork() prctl$PR_SET_PTRACER(0x59616d61, 0x0) 10:51:23 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000002480)=[{&(0x7f0000000080)='\t', 0x1}, {&(0x7f0000000140)='\v', 0x1}], 0x0, 0x0) [ 191.071027][ T9645] loop2: detected capacity change from 0 to 264192 10:51:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xf000000, 0x0) 10:51:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x50000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:24 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x28440, 0x0) 10:51:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040), 0x10) 10:51:24 executing program 2: syz_read_part_table(0x12000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000001180), 0x4) 10:51:24 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x26000010) 10:51:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x10000000, 0x0) 10:51:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x54000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 191.802144][ T9684] loop2: detected capacity change from 0 to 264192 10:51:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 10:51:24 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), 0xffffffffffffffff) 10:51:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:25 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000004d80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004d40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}], 0x20}, 0x0) 10:51:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5c000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:25 executing program 2: syz_read_part_table(0x20000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x11000000, 0x0) 10:51:25 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, r0) 10:51:25 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000003940)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x0) 10:51:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x60000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:25 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x161401, 0x0) [ 192.666359][ T9730] loop2: detected capacity change from 0 to 264192 10:51:25 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0c0100006404"], 0x10c}}, 0x0) 10:51:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x12000000, 0x0) 10:51:25 executing program 2: syz_read_part_table(0x25000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 192.794216][ T9759] loop2: detected capacity change from 0 to 264192 10:51:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x18, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:26 executing program 4: r0 = epoll_create1(0x0) syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20004080) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0xa0002000}) 10:51:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x61000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x20000000, 0x0) 10:51:26 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) accept$packet(r0, 0x0, 0x0) 10:51:26 executing program 2: syz_read_part_table(0x3f000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x64000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:26 executing program 3: syz_genetlink_get_family_id$smc(&(0x7f0000000a80), 0xffffffffffffffff) 10:51:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x3f000000, 0x0) 10:51:26 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x10}, 0x10}}, 0x0) 10:51:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6c000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 193.533004][ T25] audit: type=1400 audit(1624359086.346:110): avc: denied { block_suspend } for pid=9772 comm="syz-executor.4" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 193.563447][ T9784] loop2: detected capacity change from 0 to 264192 10:51:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000003300)=[{0x0}, {&(0x7f0000000500)={0x10}, 0x10}], 0x2}, 0x0) [ 193.652173][ T9815] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9815 comm=syz-executor.3 10:51:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x18, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:27 executing program 2: syz_read_part_table(0x40000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x74000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:27 executing program 4: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='ceph\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0x0, 0x0) 10:51:27 executing program 3: syz_read_part_table(0x0, 0xffffffffffffffff, &(0x7f00000004c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}]) 10:51:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x40000000, 0x0) 10:51:27 executing program 4: syz_io_uring_setup(0x485b, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x3) 10:51:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7c000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x526d0200, 0x0) [ 194.415907][ T9840] loop2: detected capacity change from 0 to 264192 10:51:27 executing program 2: syz_read_part_table(0x40000800, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 10:51:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7fff0000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 194.554071][ T9862] loop2: detected capacity change from 0 to 264192 10:51:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x18, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x5e6d0200, 0x0) 10:51:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x81000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:28 executing program 4: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_provisioning(&(0x7f0000000100), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000006a"], 0x18, r0) 10:51:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000003300)=[{&(0x7f0000000240)={0x29c, 0x34, 0x200, 0x70bd2d, 0x25dfdbfb, "", [@nested={0xdb, 0x4e, 0x0, 0x1, [@typed={0x8, 0x1f, 0x0, 0x0, @ipv4=@loopback}, @generic="c38e68bb1c64316d4c5af58925c44f", @typed={0x4, 0x7c}, @generic="3ee4c8c7765f3ab170f3389b0cb72475ea3773f86f39f39577c4b30833f8e865b9114593661cce48e8dfc71bb3b903c7fe49b371948bab439665bf25cc20b0e1e2a7569b47cca235b14666f46956ca0e1e6bd2f2e691b1afcec94e878ad5c2158e2b6a57423a65ff5aa42b595763e6c714230a25aa713a5bcb5892bf89c1fd94d57610e11bc56df18374d6552afb348f876909c9657afd942a2be60ab7fb4824ffc288d78c8f03745531f014e2df166956ca0b95fc923212fef6789d"]}, @nested={0x13b, 0x76, 0x0, 0x1, [@typed={0x14, 0x7e, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @empty}}, @generic="0831bb20b3481c081ba8503ace403c2f91ad8ed02fc52970d00988e6cf00bf83ee70ba0bfa14f09735ed56f97c45e045d9719a3782ec850abb99dd054decfb6423d3c6d2faf6caac9b78260fe061b050e392c25a08a171f91a3dbf0578e3cab871d0eaa430ed33fdb46919a4116a712c43df2f66a6bd65833dfaeb2a686222a90ff15c74b8b108d6a652e962de9e16edec0d6ad04b04a4ee7df2a3e0994bcd4cbcdc46231b3ff557ea37238c0b3e0129dd8230bbc6e51a4ee2a3e60bcfbfa183cbf8e454fafcaeb2e3c17846d763b29179243fbb2993a7e0efa1283b849bc9eb8db61dbb6bb8f0", @typed={0x8, 0xd3, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x8, 0x35, 0x0, 0x0, @fd=r0}, @typed={0x14, 0x24, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}, @typed={0x8, 0x5c, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x62, 0x0, 0x0, @u32=0xa9}, @typed={0x8, 0x1a, 0x0, 0x0, @pid}]}, @generic="fa7e766cd3df457432482b3c320c337ddeb1bd33df1945c279f13616b20257c59b6d4b6e84dce378ac5b1ea1fe2e61346647ac2ca9770f9ae7602692a749e5d47324e190970b0a4c3a8bc061668105bfa3456dceb08ae2967bb9f1cb64cd4a8e6412621d80611b84d9985236b40ada9607"]}, 0x29c}, {&(0x7f0000000500)={0xd0, 0x11, 0x1, 0x70bd25, 0x25dfdbfc, "", [@generic="31de76de9aa0152d4b4628607a1cc64c7618da262da35f2473f50ecbbf0bd12daa48a330276cd660a7a715d78ce58ee4797c5e9cdc2c179e438d003e62de31d4934cb58a86a94a825a2cb830b57b0e1888ca666a74e458b130f49a23ce4fa67ce6176a1604a45c75c093bf343c4ecb3ed15292cfd4098610dc3dce8ce5", @generic="2a449fdca3e9cd5a0249ebc0217cee89d9c6aeca14069cbcf537175b8b73f1fd1e59d1793f75c17ef948190522022806613d77d945f036aac8c2d6e38adba82e7b"]}, 0xd0}, {&(0x7f00000000c0)={0x20, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, "", [@generic="af42fb74e0c3", @typed={0x8, 0x5f, 0x0, 0x0, @ipv4=@multicast1}]}, 0x20}, {&(0x7f0000000600)={0x6c8, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x4}, @nested={0x271, 0x0, 0x0, 0x1, [@generic="b8f02527a7f65513e9e41d370b59a751b0254a0e0d233f8b7d555223df57eccc18fbed404c3de56557293819fa1c13f96d1db1e2cedd445ca6d4daeaa589aac06b7285164dda5cefd021d8a48d68aa7bfcc7851496a22fe3fff7e32006bdcea750ab25eb1fcdb6f51344039a957090d004dea2b03fee32d84d6cf50f41a4034cefdbce40eeff365432753d33467b36154020327c27f7d8", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="71a3d7644f6d48e7407953a485370861cee3faa342f8627db7ec5e3fb42fcf8d1ce28d70f8abbef6ed156a968db6174af59c352e0171a0da0567225eb15e4d7e9304ee149ccc615fe42fdd95448dab23bd2ae7a16c2dbff2e5f5968b98a8592c2e5cf7960e8ceaf331a1f90d5ae01ed932d2d3793b41962dccb72ad8857b85757e425b9630bfb994cabcf40be7bbca48d0f87049b691991dceb97d02c8c530c980ba65f5900ae1410173337f5cfa9d3b7020441facd9253f72a1aa535f40969f2f53c6260cdf1c676c16a9621731ff9ce9aa647253f36cc2e6aa0404dab1a835d1f37bb784e17ef2850ff7cbe1", @generic="710bb2fb059b3d006b45c53b1b9d817d5c69b0c3143bdf0967d0d127c0afe5622588ff62d7416a664011f2931a46b502a9e7e81ca66afec3bb2ec6a32fead99750f3c5184ba0da3abb409f1cdf5709cab880b70d7ff0d6750da6348752ad99d9a3f6fc96c116c26b2facd19cf14b3ded1e320aaa9ca2387fa7ad992b72c59ea912546fcfe0e0986ec6bd2463e919155aa8dfce8576d0d92f9ea085f3aa4a1dbeffc5959a937d41cbf0fde5fddd7227be7b668a0701a6b7c1c5c50e90ebade368d4d962b6a6b554ef4e24b2bffcb24cc01ac80c1138a8c7668c"]}, @generic="b09a4b66c0932a91ff35495b0509ec0be942735525dec678820fc006f3d5fc894dc3399ef6b44c669389283fdbcad9794be02ed95a4bb1c0292038fbba4f60a11b13cdfa81c7f2de90485602aa742da4f4a4ca8c4c52b310aa55404846c58f84e949251efe5cc79d7bebb207d5be2d1e16be668abd1422c7", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="46b0bf9b0a7d7a5b4b0409fe02e4825156d3faad0bd018d54ca2fe1fef6c05ed4e5b4153bb8b9fc5677b9fd786843153b11900630af6dd0dd0f617abde97c1ff3752f7c8b0c2eeda3266f4dd25fbce922a8a8895e4e86207f635c1999cb65b51", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="1b8b7e93ee414752ced6931db6880c8b31fef6f2f5e2977f4cbe5bbb295543c1d434dbe1b3bd0bb677e4473b8cc2cfb906c50a07282f2e01968d6706bda79bd66815ea6b254e863471f132cbca8c5bfae5ffd06fdaf30761e3594aa7f1b91adb74ca8e9f083cdf3fbe75f655594422f86ec556ddc4dda3dfdab9238ae27de86be9078f2170619058522332c5e7908e0dc4d8c8f16c1d2b4042b8fac84e", @nested={0x131, 0x45, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="1d3935d9a3ae51b7110755d992c7234d330923cb1b8baeea8cc0cd8cb984cb4852e4ebd16ba7be849c4829600cd2cc6a8476c776b416f30da4986d4140495086c46cd7eeec66339b5051dcff6f43b6aa1b26b575335e6274b8182bfd7534a3aa3257a8effdbc878f7515c118af59a12632b5e992af426cbbbfb26d38a90c4a1dae7c9d6e9ae369dfd5e35586db8cb97ca44d22292fb27836862ffbd77de252da38e57296991cd6", @typed={0x4, 0x58}, @generic="84b75c4d1a1e82bb888f7bbb92ef456e434bcabe48c2e534e7befbcbad42187b446bc1a2dfeeaee0eb95ecede41e1fd20050cbf8bc4e9b8ac68b1fc92fe59c19c5", @typed={0xc, 0x7a, 0x0, 0x0, @u64}, @generic="08684a574b9809390ecc33cfd5fce73a93908d74aa8675a3b34d3b53c509d9e512f81280f6", @typed={0x8, 0x53, 0x0, 0x0, @ipv4=@rand_addr=0x64010101}]}, @typed={0x90, 0x0, 0x0, 0x0, @binary="2b9a16f0286383a09768c41c89c06c116b326bd0c30a943633dbfc2a2059b2ec97b9f66af2e7137decccb0bb4acd7b114a62f0804b0aef045df156f356af326653da22658ddb1723bec71cc0d9a1bd1ef4c08954058ff5346a5e6569e369888fff6d19d3ef4f9eb7e945b9973bc23fc0bfffe5938aff7d107a2b0720e48cc2b1bea9bc287dad7400f26594b1"}, @nested={0xf1, 0x0, 0x0, 0x1, [@generic="7e4fc588f34fc8776a79f20ae5d330192929cfc8ff08ee5a936e1fc47e164ac178500b5ab5986cfc77a78f0b0e745152e76d086aca671e57019ae477c8a055663c9cf292cef48ff44d8d572006088e344189ccc23596f71686401ca58fc0c77c7bc6010167f65165937be0ef54d717df6342cb443ca26ccabb2aa7eeca71e7e8a54b1afbf8f3385d7d8f607f86bfe7fb8c00707033021fcaffb9e0e770427831fee36e1feffb5ec18c54408b215e2ee242166601a32cff65fc1fcecddaedd1350c001f92add8b5527bc399de9cb60d59e126101f7582daeb9ea840de1bfaa22aea04ac7b7fb253cc330bc72d28"]}]}, 0x6c8}, {&(0x7f0000000d00)={0x470, 0x0, 0x0, 0x0, 0x0, "", [@generic="0f2442ab05fe7beacdecb98e262c1dfde3a6c12fdf4acb6dde9d98054907cbc6eca5ddda3fc3714d54d159863aa668d3180d80999b6d5c8656b74e3551d188e077ec1361f59e584fdc55a318fbcca995f21a3310dc059c3a828be23bc2f8d8", @generic="4a6e1221a1e9579f2f63776c7cda10707141c6a2643a7f58e6926f1aeece493446fd6656747277983fde4b72027bf9d9494b108fdd0326ef664b78cbd0aecf92b4bb6fd38bdf6d271ec15cce410118935562e89db63692f77792a21d6b52fd7d9cbfe6b1f674dbc6d6670bcdbdca15df75c2ff1b940c8fd64570a6fc4e0f6cfffd5dbb3869b9841cfe54c0e4c207b3fa1aeec67cf7f599578c59982576d8cde7b78aebe697f84f9ae578", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="1de27730c0adefc5f674fe8124c8fbc6758315228a4f40b6d7e105a8292647b2ead33641cbe1aa6679221ca5cd85175a7b3040647ddbe7a83e220d6ecd41ca94a99ee075c67ffbca1a50cc4c5a8bce538d51ffa7c215a22caf5ea9f117d080d747422ec773dcaa192ddbd5be222e62adbdc2d928948abd777a7a06cd816717353712f0f0cf8b2c356dc3ee6be2117acd38a420f7483750c2dfb78507810428127ea3845e108c908c80a779df1cddbd19644635da194e46307d33c3c262677c3df1cd35aa757cdf03044e07084454141b3d0acac18ab1fcc48a17b2fe406a27e66633b35f170d944ad2e36b8c", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @nested={0x255, 0x0, 0x0, 0x1, [@generic="04bb468f12807a626bcf354364cb741dee9e198cff93f58b5b0295c47bc47dbc4d8a99e0b0ab3f8b459ccf2cf3f97a94967b32772d68ab77699f73eb6a7c56d2762bdc9b94f95ec8784f5f1054114a68a8b8e8d29662569440322fd9e78587f08081b82f2bbd3954ef54c2c862e1383070e4290a10f4b74225aad53b1d32e30d54cf1e1ec84d11ad27524500ccd52766b7f9a5292edae93361e2ef", @generic="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"]}]}, 0x470}], 0x5, 0x0, 0x0, 0x40}, 0x20000020) 10:51:28 executing program 2: syz_read_part_table(0x44db9dd7, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:28 executing program 4: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 10:51:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x84000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:28 executing program 4: io_uring_setup(0x2a41, &(0x7f0000000a80)={0x0, 0xdd2f, 0x8}) 10:51:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xef000000, 0x0) 10:51:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x87000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:28 executing program 2: syz_read_part_table(0x48000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 195.330344][ T9897] loop2: detected capacity change from 0 to 264192 [ 195.336924][ T9902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9902 comm=syz-executor.3 [ 195.349643][ T9902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9902 comm=syz-executor.3 [ 195.362321][ T9902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9902 comm=syz-executor.3 [ 195.423371][ T9902] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.3'. [ 195.463988][ T9921] loop2: detected capacity change from 0 to 264192 10:51:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x20000000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x94000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xf4ffffff, 0x0) 10:51:28 executing program 4: syz_open_dev$vcsn(&(0x7f0000000440), 0x5, 0x4000) 10:51:28 executing program 3: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) 10:51:28 executing program 2: syz_read_part_table(0x4c000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:28 executing program 3: sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x3, &(0x7f0000ffb000/0x2000)=nil, 0x2) 10:51:28 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 10:51:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9c000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 10:51:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/115, 0x73}], 0x1}, 0x0) r1 = socket(0x1c, 0x5, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000340)=""/60, 0x3c}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e00746) shutdown(r2, 0x0) readv(r3, &(0x7f0000000480)=[{&(0x7f00000001c0)=""/112, 0x70}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r3, 0x0) [ 196.176574][ T9943] loop2: detected capacity change from 0 to 264192 10:51:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xf5ffffff, 0x0) 10:51:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:29 executing program 3: pselect6(0x40, &(0x7f0000000680)={0x6}, &(0x7f00000006c0)={0x5}, 0x0, 0x0, 0x0) 10:51:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa4000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:29 executing program 2: syz_read_part_table(0x55000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xfbffffff, 0x0) 10:51:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xac000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:29 executing program 3: socket$inet6(0xa, 0x0, 0x8251) 10:51:29 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440), 0x1, 0x0) 10:51:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xfeffffff, 0x0) [ 197.052334][ T9993] loop2: detected capacity change from 0 to 264192 10:51:29 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000004d80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004d40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}], 0xf}, 0x0) 10:51:29 executing program 2: syz_read_part_table(0x55aaffff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xb1000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 197.164620][T10023] loop2: detected capacity change from 0 to 264192 10:51:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x4) 10:51:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xbd1c1000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:30 executing program 3: syz_io_uring_setup(0x0, &(0x7f0000000380), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000400), &(0x7f0000000440)) 10:51:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xff0f0000, 0x0) 10:51:30 executing program 4: syz_io_uring_setup(0x4876, &(0x7f0000000080)={0x0, 0xae39, 0x28}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 10:51:30 executing program 2: syz_read_part_table(0x68000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xfcffffff, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x22, 0x0, 0x0) 10:51:30 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x13, r0, 0x0) 10:51:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x200080, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) llistxattr(0x0, 0x0, 0x0) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 197.925362][T10046] loop2: detected capacity change from 0 to 264192 10:51:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xffefffff, 0x0) 10:51:30 executing program 2: syz_read_part_table(0x6c000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 198.025555][T10071] loop4: detected capacity change from 0 to 264192 [ 198.034497][T10071] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 198.056000][T10075] loop2: detected capacity change from 0 to 264192 [ 198.067334][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x4) 10:51:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xfffffffc, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xffffefff, 0x0) 10:51:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x200080, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) llistxattr(0x0, 0x0, 0x0) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:31 executing program 2: syz_read_part_table(0x74000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:31 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfa, 0x9, 0x2, 0x1f, 0x0, 0x7, 0x402, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext, 0x2, 0x400, 0x5, 0x2, 0x81, 0x5, 0x6189, 0x0, 0x0, 0x0, 0x40}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x5, 0x80, 0x7f, 0x5, 0x6, 0x8, 0x0, 0x4, 0x1008a, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x6, 0x100000001}, 0x4804, 0x8001, 0x0, 0x8, 0x101, 0x1000, 0x2, 0x0, 0x400, 0x0, 0x7dc5d7f9}) r1 = socket$inet6(0x2, 0x3, 0xa) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x5411, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0xb08b6765910eaee2, 0x80, 0x44, 0x9, 0x3d, 0x7, 0x0, 0x8, 0x1001, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000140)}, 0x9, 0xff, 0x20, 0x0, 0x35, 0xffffffff, 0x6, 0x0, 0x9, 0x0, 0x3}, 0xffffffffffffffff, 0x8, r0, 0x8) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0x3f, 0x7f, 0x10, @empty, @private0, 0x29, 0x8000, 0x0, 0x101}}) 10:51:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x200080, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) llistxattr(0x0, 0x0, 0x0) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 198.784699][T10096] loop2: detected capacity change from 0 to 264192 [ 198.791424][T10091] loop4: detected capacity change from 0 to 264192 [ 198.800245][T10091] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xff7f00000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xfffffff4, 0x0) 10:51:31 executing program 2: syz_read_part_table(0x7a000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 198.839968][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 198.890728][ T25] audit: type=1326 audit(1624359091.707:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10110 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xfffffff5, 0x0) 10:51:31 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x123940, 0x0) [ 198.931459][T10118] loop2: detected capacity change from 0 to 264192 [ 198.940793][T10129] loop4: detected capacity change from 0 to 264192 [ 199.003910][T10129] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 199.038090][ T2139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x10000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x4) 10:51:32 executing program 2: syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xfffffffb, 0x0) 10:51:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x200080, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) llistxattr(0x0, 0x0, 0x0) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:32 executing program 3: request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='D', 0x1, 0xfffffffffffffffe) 10:51:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0xeb7739343989e9f2) [ 199.678684][T10157] loop2: detected capacity change from 0 to 264192 [ 199.692002][T10165] loop4: detected capacity change from 0 to 264192 [ 199.699581][ T25] audit: type=1326 audit(1624359092.507:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10153 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x200080, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:32 executing program 2: syz_read_part_table(0xa3190000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xfffffffe, 0x0) 10:51:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x20000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 199.726307][T10165] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 199.749316][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:32 executing program 3: getresuid(&(0x7f0000000280), &(0x7f0000005c80), &(0x7f0000005cc0)) 10:51:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0xffffffff, 0x0) [ 199.836821][T10185] loop2: detected capacity change from 0 to 264192 [ 199.844527][T10186] loop4: detected capacity change from 0 to 264192 [ 199.866593][ T25] audit: type=1326 audit(1624359092.677:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10183 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 199.910323][T10186] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 199.935053][ T1778] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r2, 0x0, 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:33 executing program 3: stat(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f00000000c0)='./file0\x00', 0x0) 10:51:33 executing program 2: syz_read_part_table(0xc9ffffff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x200080, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:51:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x80000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:33 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) write$eventfd(r0, 0x0, 0x0) syz_io_uring_setup(0x15bd, &(0x7f00000004c0)={0x0, 0xc106, 0x8, 0x1, 0x221}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000540), &(0x7f0000000580)) 10:51:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x200080, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x2) [ 200.560733][ T25] audit: type=1326 audit(1624359093.377:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10218 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 200.567075][T10225] loop2: detected capacity change from 0 to 264192 10:51:33 executing program 2: syz_read_part_table(0xd79ddb44, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x200080, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:33 executing program 3: request_key(&(0x7f0000000080)='.dead\x00', 0x0, 0x0, 0x0) [ 200.685677][T10244] loop2: detected capacity change from 0 to 264192 10:51:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r2, 0x0, 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xd0670000c9ffff, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x200080, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x3) 10:51:34 executing program 3: r0 = socket$inet6(0x1c, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c}, 0x1c) 10:51:34 executing program 2: syz_read_part_table(0xf6ffffff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:34 executing program 3: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x202, 0x0) poll(&(0x7f0000000140)=[{r0, 0x2000}], 0x1, 0x0) poll(&(0x7f0000000000)=[{r0, 0x2000}, {r0, 0x87}], 0x2, 0x0) 10:51:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x100000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 201.442077][T10278] loop2: detected capacity change from 0 to 264192 [ 201.459243][T10277] loop4: detected capacity change from 0 to 264192 10:51:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x4) [ 201.471069][ T25] audit: type=1326 audit(1624359094.288:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10286 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:34 executing program 3: fcntl$setown(0xffffffffffffffff, 0x9, 0xffffffffffffffff) 10:51:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x200080, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 201.518616][T10277] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 201.539533][ T1778] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x200000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 201.569229][T10278] loop2: detected capacity change from 0 to 264192 [ 201.621856][ T25] audit: type=1326 audit(1624359094.438:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10308 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r2, 0x0, 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x4) 10:51:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x5) 10:51:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x200080, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000080)="9a", 0x1}, {0x0}, {&(0x7f0000000180)='-', 0x1}], 0x3, &(0x7f0000001440)=[@cred], 0x68}, 0x20084) 10:51:35 executing program 2: syz_read_part_table(0xfdfdffff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x300000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 202.294888][ T25] audit: type=1326 audit(1624359095.108:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10322 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 202.299136][T10327] loop2: detected capacity change from 0 to 264192 [ 202.331676][T10331] loop4: detected capacity change from 0 to 264192 10:51:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000014c0)={&(0x7f0000000040)=@file={0xa}, 0xa, &(0x7f0000001180)=[{&(0x7f0000000080)="9a59432e0eea07ca", 0x8}, {&(0x7f00000000c0)="95ba6fa5d0450db23b46aee4549dbd89852ba3133385ca9f948665780e00e0d74732cbb6990fc20e62248dc9af3e1b17d29179aca2a949db1c68dcfe54461f4c12c3729d2207a69859d2e0b476cb927a2355e7dd1a6a1e0dadef9e82287638155cf17f2b1c867d4ac39cb1965dbffcdaa74c2e69d0dcf1545573a1ade674318cb1ad65a6c01995d946a759d50c6a7b184cdd7665", 0x94}, {&(0x7f0000000180)="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", 0x6fd}], 0x3, &(0x7f0000001440)=[@cred], 0x68}, 0x20084) 10:51:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 202.340533][T10331] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0xffffffffffffff79, 0x0, 0x0, 0x0) 10:51:35 executing program 2: syz_read_part_table(0xfdffffff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x400000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x6) [ 202.380535][ T1778] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 202.428542][ T25] audit: type=1326 audit(1624359095.238:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10347 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 202.458226][T10346] loop2: detected capacity change from 0 to 264192 [ 202.491895][T10363] loop4: detected capacity change from 0 to 264192 [ 202.501733][T10363] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 202.524949][ T2139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x4) 10:51:35 executing program 3: pipe2(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 10:51:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x7) 10:51:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x500000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:35 executing program 2: syz_read_part_table(0xfeffffff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:36 executing program 3: fcntl$lock(0xffffffffffffffff, 0xb, &(0x7f00000000c0)) [ 203.202025][T10380] loop2: detected capacity change from 0 to 264192 [ 203.210248][ T25] audit: type=1326 audit(1624359096.028:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10373 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 203.235060][T10381] loop4: detected capacity change from 0 to 264192 10:51:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x8) 10:51:36 executing program 3: accept(0xffffffffffffffff, &(0x7f0000000100)=@in6, 0x0) 10:51:36 executing program 2: syz_read_part_table(0xff0f0000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x600000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 203.263364][T10381] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:36 executing program 3: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) sendfile(r0, 0xffffffffffffff9c, 0x0, 0x0) [ 203.345734][ T25] audit: type=1326 audit(1624359096.158:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10408 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 203.396064][T10405] loop2: detected capacity change from 0 to 264192 10:51:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x4) 10:51:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x119) 10:51:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x9) 10:51:36 executing program 2: syz_read_part_table(0xffefffff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x700000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) [ 204.068442][T10433] loop2: detected capacity change from 0 to 264192 [ 204.070015][T10435] loop4: detected capacity change from 0 to 264192 [ 204.083936][T10435] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:36 executing program 3: setgid(0xffffffffffffffff) setresgid(0xffffffffffffffff, 0x0, 0x0) setgid(0x0) 10:51:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xa) 10:51:36 executing program 2: syz_read_part_table(0xffffaa55, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 204.104780][ T25] audit: type=1326 audit(1624359096.918:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10432 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 204.128660][ T2139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:37 executing program 3: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 10:51:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x800000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 204.215944][T10465] loop4: detected capacity change from 0 to 264192 [ 204.229640][T10465] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 204.245616][ T25] audit: type=1326 audit(1624359097.058:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10468 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 204.253946][T10461] loop2: detected capacity change from 0 to 264192 [ 204.307050][ T2139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r3, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x4) 10:51:37 executing program 3: fcntl$setown(0xffffffffffffffff, 0x13, 0x0) 10:51:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xb) 10:51:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:37 executing program 2: syz_read_part_table(0xffffefff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x900000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) sendmsg$unix(r1, &(0x7f0000002580)={&(0x7f0000000080)=@abs={0x8}, 0x8, 0x0}, 0x20180) [ 204.989277][T10500] loop4: detected capacity change from 0 to 264192 [ 204.998260][ T25] audit: type=1326 audit(1624359097.808:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10489 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 205.022667][T10500] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:37 executing program 3: mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x1411, 0xffffffffffffffff, 0x0) 10:51:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xc) 10:51:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:37 executing program 2: syz_read_part_table(0xfffffdfd, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 205.044465][T10498] loop2: detected capacity change from 0 to 264192 [ 205.077153][ T2139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 205.154033][ T25] audit: type=1326 audit(1624359097.968:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10521 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 205.183140][T10533] loop4: detected capacity change from 0 to 264192 [ 205.192711][T10533] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 205.206122][T10529] loop2: detected capacity change from 0 to 264192 [ 205.234289][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x4) 10:51:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) getsockname$unix(r1, 0x0, &(0x7f00000022c0)) 10:51:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xd) 10:51:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:38 executing program 2: syz_read_part_table(0xffffff97, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1400000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:38 executing program 3: open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) [ 205.845185][ T25] audit: type=1326 audit(1624359098.658:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10546 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 205.874428][T10554] loop4: detected capacity change from 0 to 264192 [ 205.885767][T10551] loop2: detected capacity change from 0 to 264192 10:51:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:38 executing program 2: syz_read_part_table(0xffffffc9, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xe) 10:51:38 executing program 3: add_key(&(0x7f0000000300)='.dead\x00', 0x0, 0x0, 0x0, 0x0) 10:51:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1500000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 205.900187][T10554] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 205.922186][ T2139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 205.991617][T10575] loop2: detected capacity change from 0 to 264192 [ 205.999442][ T25] audit: type=1326 audit(1624359098.818:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10580 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xf) 10:51:39 executing program 3: syz_genetlink_get_family_id$fou(&(0x7f0000000940), 0xffffffffffffffff) 10:51:39 executing program 2: syz_read_part_table(0xfffffff6, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x4) 10:51:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1600000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 206.735900][T10598] loop2: detected capacity change from 0 to 264192 [ 206.743686][ T25] audit: type=1326 audit(1624359099.559:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10599 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 206.779481][T10605] loop4: detected capacity change from 0 to 264192 10:51:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x10) 10:51:39 executing program 2: syz_read_part_table(0xfffffffd, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:39 executing program 3: syz_io_uring_setup(0x3e0a, &(0x7f0000000040)={0x0, 0x0, 0x20}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 10:51:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) [ 206.788986][T10605] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f00000000c0)={'syztnl0\x00', 0x0}) 10:51:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1c00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 206.848334][ T2139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:39 executing program 3: setresuid(0xee00, 0x0, 0xee01) getresuid(&(0x7f0000000540)=0x0, &(0x7f0000000040), &(0x7f0000000080)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0xffffffffffffffff, r0, 0x0) ioctl$TIOCL_BLANKSCREEN(r1, 0x4b44, 0x0) 10:51:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x11) [ 206.890159][ T25] audit: type=1326 audit(1624359099.709:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10631 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 206.926701][T10627] loop2: detected capacity change from 0 to 264192 10:51:39 executing program 3: socket$inet6(0xa, 0x3, 0x101) [ 206.936921][T10644] loop4: detected capacity change from 0 to 264192 10:51:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 206.981566][T10644] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 207.021471][ T25] audit: type=1326 audit(1624359099.839:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10656 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 207.045092][ T1778] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x4) 10:51:40 executing program 2: syz_read_part_table(0xfffffffe, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000067c0)=[{{&(0x7f00000003c0)=@rc={0x1f, @fixed}, 0x80, 0x0}}], 0x1, 0x0) 10:51:40 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2000000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x12) 10:51:40 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x5) [ 207.655060][ T25] audit: type=1326 audit(1624359100.469:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10673 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 207.661163][T10679] loop4: detected capacity change from 0 to 264192 [ 207.682339][T10683] loop2: detected capacity change from 0 to 264192 [ 207.693628][T10679] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xda) 10:51:40 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:40 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000500)={&(0x7f00000003c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010026bd7000fbdbdf2524"], 0x40}}, 0x4) 10:51:40 executing program 2: syz_read_part_table(0x1000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2100000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 207.746822][ T398] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 207.822590][T10707] loop2: detected capacity change from 0 to 264192 [ 207.834643][T10718] loop4: detected capacity change from 0 to 264192 [ 207.845052][T10718] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 207.882209][ T1778] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x0, 0x4) 10:51:41 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x40}}, 0x0) 10:51:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xef) 10:51:41 executing program 2: syz_read_part_table(0x80000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:41 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2400000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:41 executing program 3: io_uring_setup(0x4eff, &(0x7f0000000000)) syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) [ 208.515414][T10737] loop2: detected capacity change from 0 to 264192 [ 208.522576][T10740] loop4: detected capacity change from 0 to 264192 10:51:41 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 10:51:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xfe) 10:51:41 executing program 2: syz_read_part_table(0x1000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:41 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 208.555824][T10740] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2500000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 208.609463][ T1778] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 208.643764][T10762] loop2: detected capacity change from 0 to 264192 [ 208.680871][T10780] loop4: detected capacity change from 0 to 264192 [ 208.700736][T10780] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 208.722324][ T1778] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x0, 0x4) 10:51:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000008f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000006cc0)=[@txtime={{0x18}}, @mark={{0x14}}], 0x30}}], 0x1, 0x0) 10:51:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x204) 10:51:42 executing program 2: syz_read_part_table(0x2000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:42 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2800000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 209.386179][T10798] loop4: detected capacity change from 0 to 264192 [ 209.398396][T10798] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 209.411848][ T25] kauditd_printk_skb: 3 callbacks suppressed 10:51:42 executing program 3: syz_io_uring_setup(0x5e92, &(0x7f0000000000)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 10:51:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x300) [ 209.411859][ T25] audit: type=1326 audit(1624359102.229:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10794 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 209.413385][T10805] loop2: detected capacity change from 0 to 264192 10:51:42 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:42 executing program 3: syz_io_uring_setup(0x3e0a, &(0x7f0000000040), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000000c0), 0x0) 10:51:42 executing program 2: syz_read_part_table(0x90000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 209.476694][ T398] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2c00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 209.561620][ T25] audit: type=1326 audit(1624359102.379:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10826 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 209.596241][T10830] loop2: detected capacity change from 0 to 264192 [ 209.604441][T10835] loop4: detected capacity change from 0 to 264192 [ 209.614578][T10835] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 209.648168][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x0, 0x4) 10:51:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f00000000000004", 0x1b, 0x4200}], 0x0, &(0x7f0000000800)=ANY=[]) 10:51:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x402) 10:51:43 executing program 2: syz_read_part_table(0x100000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2c02000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 210.337622][ T25] audit: type=1326 audit(1624359103.149:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10849 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 210.363977][T10853] loop2: detected capacity change from 0 to 264192 [ 210.373606][T10858] loop3: detected capacity change from 0 to 512 10:51:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x406) 10:51:43 executing program 2: syz_read_part_table(0x200000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2d00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 210.390489][T10858] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 210.397915][T10858] EXT4-fs (loop3): mount failed 10:51:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 210.455829][T10858] loop3: detected capacity change from 0 to 512 [ 210.462643][ T25] audit: type=1326 audit(1624359103.279:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10879 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 210.500481][T10883] loop2: detected capacity change from 0 to 264192 [ 210.504214][T10858] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 210.511688][T10893] loop4: detected capacity change from 0 to 264192 [ 210.513593][T10858] EXT4-fs (loop3): mount failed [ 210.525261][T10893] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 210.589131][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, r4, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x0) 10:51:44 executing program 2: syz_read_part_table(0x204000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x500) 10:51:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3000000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:44 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:51:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 211.245988][T10912] loop4: detected capacity change from 0 to 264192 [ 211.255694][ T25] audit: type=1326 audit(1624359104.069:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10908 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 211.258077][T10920] loop2: detected capacity change from 0 to 264192 10:51:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@loopback, 0x0, 0x1200, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 10:51:44 executing program 3: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0xa9aaaa0a, 0x0, 0x0) [ 211.289398][T10912] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x600) 10:51:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3400000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:44 executing program 2: syz_read_part_table(0x300000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 211.341630][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 211.391161][ T25] audit: type=1326 audit(1624359104.209:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10940 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 211.439032][T10951] loop4: detected capacity change from 0 to 264192 [ 211.448246][T10953] loop2: detected capacity change from 0 to 264192 [ 211.457100][T10951] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 211.487939][ T2139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:44 executing program 2: syz_read_part_table(0x400000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x604) 10:51:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x2, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 10:51:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3500000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 212.126743][ T25] audit: type=1326 audit(1624359104.940:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10968 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 212.128322][T10975] loop2: detected capacity change from 0 to 264192 [ 212.158377][T10974] loop4: detected capacity change from 0 to 264192 10:51:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000240)=[{0x5}]}) 10:51:45 executing program 2: syz_read_part_table(0x500000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 212.169247][T10974] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:45 executing program 3: add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)='y', 0x1, 0xfffffffffffffffd) 10:51:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x700) 10:51:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3c00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:45 executing program 0: socket$inet6(0x2, 0x1, 0x106) 10:51:45 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000040)) timer_create(0x3, &(0x7f00000001c0)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000200)) [ 212.236737][T10994] loop2: detected capacity change from 0 to 264192 [ 212.247816][ T2139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:45 executing program 3: add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffb) 10:51:45 executing program 2: syz_read_part_table(0x600000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 212.304196][ T25] audit: type=1326 audit(1624359105.120:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10997 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 212.337021][T11016] loop4: detected capacity change from 0 to 264192 10:51:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x900) 10:51:45 executing program 0: fsopen(&(0x7f00000000c0)='jffs2\x00', 0x0) 10:51:45 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f0000000000)=""/223, 0xdf) 10:51:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 212.378026][T11016] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:45 executing program 3: clock_gettime(0x0, &(0x7f0000000400)) [ 212.446819][ T2139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 212.462635][ T25] audit: type=1326 audit(1624359105.280:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11036 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:45 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='pagemap\x00') 10:51:45 executing program 3: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 212.505418][T11039] loop2: detected capacity change from 0 to 264192 10:51:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xa00) 10:51:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4000000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 212.555778][T11058] loop4: detected capacity change from 0 to 264192 [ 212.570596][T11058] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:45 executing program 2: syz_read_part_table(0x604000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:45 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r2) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r0, 0x330f, 0x0) 10:51:45 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) [ 212.601473][ T22] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 212.612053][ T25] audit: type=1326 audit(1624359105.430:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11066 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:45 executing program 3: socketpair(0x1, 0x0, 0x0, &(0x7f0000000140)) 10:51:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4400000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 212.669900][T11077] loop2: detected capacity change from 0 to 264192 [ 212.683709][T11084] loop4: detected capacity change from 0 to 264192 10:51:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xb00) 10:51:45 executing program 2: syz_read_part_table(0x700000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:45 executing program 0: socketpair(0x23, 0x800, 0x5, &(0x7f0000000000)) 10:51:45 executing program 3: socket(0x15, 0x5, 0x7) [ 212.717270][T11084] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:45 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) 10:51:45 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0}, 0x68) 10:51:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xc00) [ 212.787823][ T2139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 212.819257][T11113] loop2: detected capacity change from 0 to 264192 10:51:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4500000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:45 executing program 3: shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffa000/0x4000)=nil) 10:51:45 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/cpuinfo\x00', 0x0, 0x0) 10:51:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xd00) 10:51:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500), 0x0, 0x2001}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000800)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000500)=ANY=[], 0xc007, 0x0) [ 212.913576][T11131] loop4: detected capacity change from 0 to 264192 [ 212.936444][T11113] loop2: detected capacity change from 0 to 264192 [ 212.952087][T11131] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:45 executing program 2: syz_read_part_table(0x800000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4800000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:45 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000180)=""/89, 0x59) 10:51:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) read(r3, &(0x7f0000000240)=""/185, 0xb9) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 10:51:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xe00) [ 213.034308][T11161] loop0: detected capacity change from 0 to 512 [ 213.060595][T11161] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 10:51:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4c00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:45 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb}, 0xb) write$P9_RWRITE(r0, &(0x7f0000000080)={0xb}, 0xb) [ 213.094838][T11161] EXT4-fs error (device loop0): __ext4_new_inode:1071: comm syz-executor.0: reserved inode found cleared - inode=3 [ 213.116021][T11185] loop2: detected capacity change from 0 to 264192 [ 213.123657][T11186] loop4: detected capacity change from 0 to 264192 [ 213.134546][T11186] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:46 executing program 2: syz_read_part_table(0x900000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xf00) 10:51:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:46 executing program 0: request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) 10:51:46 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x63, 0x61, 0x0, 0x37, 0x31]}, &(0x7f0000000100)={0x0, "20d99659d917f7bdfaa404447b642add7122c181200cb64a8daf59a93ad4e7f4f6500eef2448ab7af58c44d81cbff0f84e4d21fb59624ecfc4617723c19efa0e"}, 0x48, r0) 10:51:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES32], 0x24}}, 0x0) 10:51:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4d00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 213.209552][ T22] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 213.245699][T11218] loop2: detected capacity change from 0 to 264192 10:51:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x1100) 10:51:46 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', 0x0) [ 213.290630][T11224] loop4: detected capacity change from 0 to 264192 [ 213.300195][T11224] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:46 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x51024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:51:46 executing program 2: syz_read_part_table(0xa00000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}]}, 0x1c}}, 0x8000) [ 213.356530][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:46 executing program 3: r0 = fsopen(&(0x7f0000000040)='nfsd\x00', 0x0) fsmount(r0, 0x0, 0x0) 10:51:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x1200) 10:51:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5000000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 213.409621][T11248] loop2: detected capacity change from 0 to 264192 [ 213.415721][T11251] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11251 comm=syz-executor.0 [ 213.447865][T11263] loop4: detected capacity change from 0 to 264192 10:51:46 executing program 0: socketpair(0x28, 0x0, 0x6, &(0x7f00000000c0)) 10:51:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:46 executing program 2: syz_read_part_table(0xb00000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:46 executing program 3: timer_create(0x3, 0x0, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, 0x3938700}}, &(0x7f0000000180)) 10:51:46 executing program 0: socketpair(0x1d, 0x0, 0x7ff, &(0x7f0000000000)) [ 213.459574][T11263] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 213.485308][ T22] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x2000) 10:51:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000100)) 10:51:46 executing program 3: socket(0x11, 0xa, 0xce) 10:51:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5400000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:46 executing program 0: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x80000001) 10:51:46 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, 0x3938700}}, 0x0) 10:51:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x3f00) [ 213.604714][T11295] loop4: detected capacity change from 0 to 264192 [ 213.627389][T11300] loop2: detected capacity change from 0 to 264192 [ 213.641068][T11295] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:46 executing program 3: io_setup(0xa, &(0x7f0000000080)=0x0) r1 = fsopen(&(0x7f00000000c0)='jffs2\x00', 0x0) io_submit(r0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 10:51:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:46 executing program 2: syz_read_part_table(0xc00000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, &(0x7f0000000100)={0x0, "20d99659d917f7bdfaa404447b642add7122c181200cb64a8daf59a93ad4e7f4f6500eef2448ab7af58c44d81cbff0f84e4d21fb59624ecfc4617723c19efa0e"}, 0x48, r0) 10:51:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5c00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x4000) [ 213.702428][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:46 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000", 0x5c, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000800)=ANY=[]) mknodat$null(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x103) [ 213.764368][T11326] loop4: detected capacity change from 0 to 264192 [ 213.772906][T11326] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:46 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) 10:51:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xda00) [ 213.816108][T11347] loop3: detected capacity change from 0 to 512 [ 213.823587][ T22] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 213.833414][T11344] loop2: detected capacity change from 0 to 264192 10:51:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6000000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:46 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000800)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0xc007, 0x0) mknodat$null(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x103) 10:51:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xa53d}]}, 0x24}}, 0x8000) 10:51:46 executing program 2: syz_read_part_table(0xd00000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 213.870483][T11347] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 10:51:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xef00) [ 213.938782][T11373] loop0: detected capacity change from 0 to 512 [ 213.975138][T11373] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 10:51:46 executing program 0: r0 = epoll_create1(0x0) r1 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) [ 213.977069][T11380] loop4: detected capacity change from 0 to 264192 [ 213.993691][T11382] loop2: detected capacity change from 0 to 264192 [ 213.995896][T11389] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11389 comm=syz-executor.3 [ 214.024072][T11380] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:46 executing program 2: syz_read_part_table(0xe00000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:46 executing program 3: openat2(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={0x944c0}, 0x18) 10:51:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6100000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:46 executing program 3: socketpair(0x8, 0x0, 0x0, &(0x7f0000000140)) 10:51:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xfeff) 10:51:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x3}}}, 0x1c}}, 0x0) 10:51:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="b80000001900010000000000fcdbdf25fc010000000000000000000000000000e000000200000000000000000000000000000000000000000a0000802b5bea8c6470fb00000000de"], 0xb8}}, 0x0) 10:51:47 executing program 2: syz_read_part_table(0xf00000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 214.107544][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 214.129656][T11410] loop2: detected capacity change from 0 to 264192 10:51:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6400000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xff0f) 10:51:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}]}, 0x1c}}, 0x0) [ 214.213680][T11432] loop4: detected capacity change from 0 to 264192 [ 214.238862][T11432] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c0a, &(0x7f0000000140)) 10:51:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:47 executing program 0: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) 10:51:47 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, 0x0) 10:51:47 executing program 2: syz_read_part_table(0x1000000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 214.263962][T11448] loop2: detected capacity change from 0 to 264192 [ 214.281698][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xfffe) 10:51:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6c00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000000)={'veth1\x00', @ifru_ivalue}) 10:51:47 executing program 3: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000000040)=0x0) fork() wait4(0x0, 0x0, 0x0, 0x0) timer_settime(r3, 0x0, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) [ 214.396231][T11476] loop2: detected capacity change from 0 to 264192 [ 214.404725][T11480] loop4: detected capacity change from 0 to 264192 [ 214.413548][T11480] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 214.426417][ T25] kauditd_printk_skb: 11 callbacks suppressed 10:51:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x20000) 10:51:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000140)={0x1, 0xfffffffd, 0x0, 0x0, 0x104, 0x0}) [ 214.426428][ T25] audit: type=1326 audit(1624359107.240:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11478 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 214.462098][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:47 executing program 2: syz_read_part_table(0x1100000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7400000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x26d52) [ 214.546995][T11513] loop4: detected capacity change from 0 to 264192 [ 214.554417][T11514] loop2: detected capacity change from 0 to 264192 [ 214.565023][ T25] audit: type=1326 audit(1624359107.380:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11502 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:47 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') 10:51:47 executing program 2: syz_read_part_table(0x1200000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 214.601355][T11513] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7c00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:47 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() tkill(r0, 0x3b) 10:51:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 214.682737][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 214.700820][T11536] loop2: detected capacity change from 0 to 264192 [ 214.701965][ T25] audit: type=1326 audit(1624359107.520:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11533 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 214.782319][T11554] loop4: detected capacity change from 0 to 264192 [ 214.802513][T11554] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 214.826790][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:51:48 executing program 3: r0 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) 10:51:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x26d5e) 10:51:48 executing program 2: syz_read_part_table(0x2000000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'macvtap0\x00'}}}}}, 0x38}}, 0x0) 10:51:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8000000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(0x0, &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:48 executing program 3: io_setup(0x8, &(0x7f0000000140)) io_setup(0xfea2, &(0x7f0000000040)) io_setup(0x54, &(0x7f0000000080)=0x0) io_setup(0x800, &(0x7f00000000c0)) io_destroy(r0) 10:51:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2c040081, 0x0, 0x0) [ 215.375167][ T25] audit: type=1326 audit(1624359108.190:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11565 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 215.400147][T11571] loop4: detected capacity change from 0 to 264192 [ 215.400223][T11574] loop2: detected capacity change from 0 to 264192 10:51:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x40000) 10:51:48 executing program 2: syz_read_part_table(0x2500000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(0x0, &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8100000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:48 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f00000000c0)) 10:51:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x200000) 10:51:48 executing program 0: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) fork() wait4(0x0, 0x0, 0x0, 0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 10:51:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) [ 215.517951][ T25] audit: type=1326 audit(1624359108.340:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11598 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 215.551502][T11604] loop4: detected capacity change from 0 to 264192 [ 215.552666][T11600] loop2: detected capacity change from 0 to 264192 10:51:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(0x0, &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8400000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:48 executing program 2: syz_read_part_table(0x3f00000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:48 executing program 3: pipe(&(0x7f0000000580)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, 0x0) 10:51:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xda0000) 10:51:48 executing program 3: pselect6(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x8}, 0x0, 0x0, 0x0) [ 215.649274][ T25] audit: type=1326 audit(1624359108.470:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11629 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:48 executing program 3: syz_io_uring_setup(0x4f81, &(0x7f0000000000)={0x0, 0xa7fd, 0x0, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 10:51:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x1000000) 10:51:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8700000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), 0x0, 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 215.705614][T11634] loop2: detected capacity change from 0 to 264192 [ 215.725281][T11646] loop4: detected capacity change from 0 to 264192 [ 215.791297][ T25] audit: type=1326 audit(1624359108.610:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11658 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 215.854181][T11634] loop2: detected capacity change from 0 to 264192 [ 215.854704][T11673] loop4: detected capacity change from 0 to 264192 10:51:49 executing program 0: syz_io_uring_setup(0x4f81, &(0x7f0000000000)={0x0, 0xa7fd}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) 10:51:49 executing program 3: pipe(&(0x7f0000000580)={0xffffffffffffffff}) pipe(&(0x7f0000000580)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)) 10:51:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x2000000) 10:51:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9400000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:49 executing program 2: syz_read_part_table(0x4000000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), 0x0, 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:49 executing program 3: epoll_wait(0xffffffffffffffff, &(0x7f0000000180)=[{}], 0x1, 0x3) 10:51:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 216.520890][ T25] audit: type=1326 audit(1624359109.330:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11684 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 216.525575][T11692] loop4: detected capacity change from 0 to 264192 [ 216.562721][T11697] loop2: detected capacity change from 0 to 264192 10:51:49 executing program 0: pipe(&(0x7f0000000580)) pselect6(0x40, &(0x7f0000000240)={0x2}, &(0x7f0000000280)={0x8}, &(0x7f00000002c0), &(0x7f0000000300)={0x0, 0x3938700}, &(0x7f0000000380)={&(0x7f0000000340)={[0x2]}, 0x8}) 10:51:49 executing program 2: syz_read_part_table(0x4000080000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x2040000) 10:51:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), 0x0, 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9c00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:49 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0}) 10:51:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x3000000) 10:51:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) [ 216.688715][ T25] audit: type=1326 audit(1624359109.500:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11719 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 216.690958][T11729] loop4: detected capacity change from 0 to 264192 [ 216.722189][T11732] loop2: detected capacity change from 0 to 264192 10:51:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa400000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:49 executing program 2: syz_read_part_table(0x44db9dd700000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:49 executing program 0: openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x18) 10:51:49 executing program 0: pipe(&(0x7f0000000580)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) syz_io_uring_setup(0xe02, &(0x7f00000000c0), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 10:51:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x4000000) 10:51:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 216.822045][ T25] audit: type=1326 audit(1624359109.630:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11750 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 216.849616][T11751] FAT-fs (loop4): bogus number of reserved sectors [ 216.856233][T11751] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:49 executing program 0: socket$inet(0x2, 0x2, 0x80) 10:51:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xac00000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 216.926392][T11774] loop2: detected capacity change from 0 to 264192 [ 216.938065][T11772] FAT-fs (loop4): bogus number of reserved sectors [ 216.944596][T11772] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:50 executing program 3: syz_io_uring_setup(0x4f81, &(0x7f0000000000)={0x0, 0xa7fd, 0x8}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), 0x0) 10:51:50 executing program 2: syz_read_part_table(0x4800000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x5000000) 10:51:50 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)={0x0, 0x3938700}, &(0x7f0000000380)={&(0x7f0000000340)={[0x2]}, 0x8}) 10:51:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xb100000000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:50 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10040, 0x0) 10:51:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x6000000) [ 217.602870][T11808] FAT-fs (loop4): bogus number of reserved sectors [ 217.609583][T11808] FAT-fs (loop4): Can't find a valid FAT filesystem [ 217.611049][T11816] loop2: detected capacity change from 0 to 264192 10:51:50 executing program 2: syz_read_part_table(0x4c00000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 10:51:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xbd1c100000000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:50 executing program 0: openat$dir(0xffffffffffffff9c, 0x0, 0x410000, 0x0) 10:51:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x6040000) 10:51:50 executing program 3: socketpair(0x2c, 0x0, 0x0, &(0x7f00000001c0)) 10:51:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000400)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 217.738253][T11836] loop2: detected capacity change from 0 to 264192 10:51:50 executing program 2: syz_read_part_table(0x5500000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:50 executing program 3: socketpair(0x8, 0x0, 0x0, &(0x7f0000000100)) 10:51:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x7000000) 10:51:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xfcffffff00000000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001340), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000400)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) 10:51:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x8000000) [ 217.885839][T11868] loop2: detected capacity change from 0 to 264192 10:51:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, @remote}}) 10:51:50 executing program 2: syz_read_part_table(0x55aaffff00000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x9000000) 10:51:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xffffc9000067d000, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c01000012001307"], 0x138}}, 0x0) recvmmsg(r0, &(0x7f0000005580)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000580)=""/131, 0x83}, {&(0x7f0000000640)=""/155, 0x9b}, {&(0x7f0000000700)=""/66, 0x42}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/253, 0xfd}], 0x6}}], 0x1, 0x0, 0x0) [ 217.975739][T11899] loop4: detected capacity change from 0 to 264192 [ 217.995568][T11899] FAT-fs (loop4): bogus number of FAT sectors [ 218.001873][T11899] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x2}]}) 10:51:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x40049409, 0x0) [ 218.056369][T11918] netlink: 268 bytes leftover after parsing attributes in process `syz-executor.0'. [ 218.066238][T11918] netlink: 268 bytes leftover after parsing attributes in process `syz-executor.0'. [ 218.079808][T11910] loop2: detected capacity change from 0 to 264192 10:51:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:50 executing program 2: syz_read_part_table(0x6800000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xa000000) 10:51:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0xc0189436, &(0x7f0000000180)={'syztnl2\x00', 0x0}) 10:51:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x5}, {}, {}, {}]}) 10:51:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x14, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:51 executing program 0: socketpair(0x22, 0x0, 0x3f, &(0x7f0000000240)) 10:51:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xb000000) [ 218.194069][T11940] loop4: detected capacity change from 0 to 264192 [ 218.196495][T11941] loop2: detected capacity change from 0 to 264192 [ 218.212120][T11940] FAT-fs (loop4): bogus number of FAT sectors [ 218.218305][T11940] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8910, &(0x7f0000000180)={'syztnl2\x00', 0x0}) 10:51:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x2000004e20, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000240)='htcp\x00', 0x5) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) [ 218.284999][T11941] loop2: detected capacity change from 0 to 264192 10:51:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002300)={&(0x7f0000000040)=@abs, 0x6e, 0x0}, 0x0) 10:51:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xc000000) 10:51:51 executing program 2: syz_read_part_table(0x6c00000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) [ 218.401029][T11988] loop4: detected capacity change from 0 to 264192 10:51:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x401c5820, &(0x7f0000000180)={'syztnl2\x00', 0x0}) [ 218.442744][T11988] FAT-fs (loop4): bogus number of FAT sectors [ 218.448861][T11988] FAT-fs (loop4): Can't find a valid FAT filesystem [ 218.460873][T11999] loop2: detected capacity change from 0 to 264192 10:51:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xd000000) 10:51:51 executing program 2: syz_read_part_table(0x7400000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x3, 0x300, 0x0) 10:51:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {0x0, 0x0, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000400)={0x14, r1, 0x1, 0x0, 0x0, {0x9}}, 0x14}}, 0x0) 10:51:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x5, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:51 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000040)) 10:51:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xe000000) [ 218.570207][T12029] loop4: detected capacity change from 0 to 264192 [ 218.585453][T12029] FAT-fs (loop4): bogus number of FAT sectors [ 218.591573][T12029] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @ipv4={'\x00', '\xff\xff', @local}}}) 10:51:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x6, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {0x0, 0x0, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 218.634773][T12026] loop2: detected capacity change from 0 to 264192 10:51:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x894a, &(0x7f0000000180)={'syztnl2\x00', 0x0}) 10:51:51 executing program 3: prctl$PR_SET_PTRACER(0x1c, 0x0) 10:51:51 executing program 2: syz_read_part_table(0x7a00000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x7, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 218.709979][T12066] loop4: detected capacity change from 0 to 264192 [ 218.721072][T12066] FAT-fs (loop4): bogus number of FAT sectors [ 218.727253][T12066] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xf000000) 10:51:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in6=@mcast2}, {@in6=@empty, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x2, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 10:51:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {0x0, 0x0, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 10:51:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x10000000) [ 218.816074][T12082] loop2: detected capacity change from 0 to 264192 10:51:51 executing program 2: syz_read_part_table(0x97ffffff00000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 10:51:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x2, &(0x7f0000000180)={'syztnl2\x00', 0x0}) 10:51:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xc, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:51 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x202) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 10:51:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0), 0x0, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 218.901527][T12112] loop4: detected capacity change from 0 to 264192 [ 218.924273][T12112] FAT-fs (loop4): bogus number of FAT sectors [ 218.930544][T12112] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x11000000) 10:51:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x2000004e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffe, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='cdg\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendto$inet(r0, &(0x7f0000000240), 0xfffffd46, 0x81f4, 0x0, 0x1f4) socket(0x0, 0x0, 0x0) 10:51:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x2000004e20, @broadcast}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='cdg\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendto$inet(r0, &(0x7f0000000240), 0xfffffd46, 0x0, 0x0, 0x1f4) [ 218.990339][T12132] loop2: detected capacity change from 0 to 264192 [ 219.000294][T12135] loop4: detected capacity change from 0 to 264192 10:51:51 executing program 2: syz_read_part_table(0xa319000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x40049409, &(0x7f0000000180)={'syztnl2\x00', 0x0}) 10:51:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0), 0x0, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x14, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 219.061130][T12135] FAT-fs (loop4): bogus number of FAT sectors [ 219.067244][T12135] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x12000000) 10:51:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x40086602, 0x0) 10:51:51 executing program 3: io_uring_setup(0x78f7, &(0x7f0000000000)) io_uring_setup(0x7a17, &(0x7f0000000080)={0x0, 0xed89, 0x8}) [ 219.137258][T12162] loop2: detected capacity change from 0 to 264192 [ 219.161453][T12165] loop4: detected capacity change from 0 to 264192 10:51:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x2, 0x0) 10:51:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x5460, 0x0) 10:51:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x20000000) [ 219.196127][T12165] FAT-fs (loop4): bogus number of FAT sectors [ 219.202300][T12165] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:52 executing program 0: io_uring_setup(0x78f7, &(0x7f0000000000)={0x0, 0x0, 0x2}) 10:51:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:52 executing program 2: syz_read_part_table(0xc9ffffff00000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x4020940d, &(0x7f0000000180)={'syztnl2\x00', 0x0}) 10:51:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0), 0x0, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 219.284527][T12162] loop2: detected capacity change from 0 to 264192 10:51:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x3f000000) 10:51:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={0x0}, 0x18}, 0x0) 10:51:52 executing program 3: clone3(&(0x7f00000047c0)={0x1801a1700, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:51:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000300)={0x30, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6}]}, 0x30}}, 0x0) 10:51:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d", 0x3, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 219.374881][T12212] loop4: detected capacity change from 0 to 264192 [ 219.393825][T12212] FAT-fs (loop4): bogus number of FAT sectors [ 219.399975][T12212] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x16, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 219.438826][T12208] loop2: detected capacity change from 0 to 264192 [ 219.469794][T12234] loop4: detected capacity change from 0 to 264192 [ 219.470156][ T25] kauditd_printk_skb: 10 callbacks suppressed 10:51:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002300)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f00000000c0)="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", 0xec1}], 0x1}, 0x0) 10:51:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x40000000) 10:51:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d", 0x3, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:52 executing program 2: syz_read_part_table(0xf6ffffff00000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x20000300, 0x0, 0x0, 0x20000330, 0x20000360], 0x0, &(0x7f0000000080), &(0x7f0000000300)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 219.470167][ T25] audit: type=1326 audit(1624359112.281:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12231 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 219.504904][T12234] FAT-fs (loop4): bogus number of FAT sectors [ 219.511975][T12234] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x1c, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:52 executing program 0: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003000)=[{0x0, 0x0, &(0x7f0000002e80)=[{&(0x7f0000000e80)="1ee654bd85a1ef155063f39e4030160527425505808ffe12bfdc3d5344f7b6dda6688760ff78b8f8b34fa9d5afc8c6fae6600867c467f7e90ded64ebaa35750db26454a1d76e71cf50b2d61dc4a6b2e55588932a4362439d31aa51f5b8f9d1f076a4c9d54b0c25758df67538646d9d0076425fe38260e855ebf8fd6d458e084babbfcb4b4ff20916cfc315bf6371504445f644631f3145df1b70531673cb833e2d7d8c63fa4e639b112b95e38aeff423f0c97c178a2e6065c77cfc4e420a247fcfd8b013007a07209f041f2539b5d99bea2130adba4d3705577660eee1b27990843ecbd529a21dca210059e14e6bd9655d89d0a879dc7052e2ace2e9c6fff1f42efdb5f1e597d05c065c0eb48da3cc9ddb5d7d57c2c430e56f0ef939e42b98c8f9c0b251b6cda629fb3cdcf9e1c7756e5f7db0e58caabe232d7639d14685c383f3c674414e7af357f3a315be353791bd283af87d84708e429db03ed50fa1ec38e463598544e989657bfb4ea099f8f1eab2de50c72f204495160f85a4c0cdeebb1c3b3212deec46bb15c99927a9c6341405585b032ec3cd47073e640a535202bb61f018f661ea682c3ac3965b28396ee94d05b160037c44c81a6c4390f771483c177cd6c889c21adb28955001014a58e1b70fb61c711a1cf487614221541769e33ed63874fd3a37df5618c0cf571e41b1247ba7b2697a34b3f08162e97fe9c10e79e70cb6f7623ddd2e61192bbcec2e50a44aa701d8ee3c3a3f5bd18f48fff4cdbe14ac772dc8541ae90c9fa0553802a4fca072a9104a478bc145eaa8d9320dfc266a911dbfb2e78a14ac46ccf966e8de3623a3703d907df477c30af242930eafa37df87d1f7385dea5914e7e0526a7137a3a68da1542fb4942b84f93974fd698523a3f503fe718f8e5bfe4356c86c7d51b24a2f77ad6d653a97ab4435c1ed3e7785af93271a0931efade5b29b005385743f51a5c59a4879ad78cb84f54f929e58e17dbfc6d28f1d2bf90a4a7fd9572be7f765f5828721805d32602968f099603a0825b050f7b30ebb89c20a592a55bafd9823957a642195250aa2e339ada5c6e2fb0dfa101cc1545de8664ecd9740db2d7f5ff97e558c705592aaf5c36e16cfe29545da77cdf0edb3e5f800a45219bdeefeec267c465cdac914afb8053cec887e2c7769c4c2e14698c1b263814b2976b85f7130bf92f04c936f6960dcbea5a16dceb1589080ded8451857898950f31e90d20d4ba425059f5ed9eca32aa9deea1d42d8b1fa7bb6cf6851eb2305a0dbe3515021fcbfafd0b456e1f912bba300abb9c9065f1716e2dc9f7bf39ea7aeddcfc2171d87da3ffe230ce38b36bca9c3e1dbb9d7a5f45e30a0296262d514746e3dcc4dede0a1db1be08e145346474ec508ef9b1893e446f2e2ecf6d4dac5cc31d9b5bfb8589c9dcc2382a1ca773f89560bd9ff1799b420f6f5415e705576c09c4a974e010e21d45952fb122165c5e21b1252fadbd885a0033f09aaa2cb0a68ec2230ee071cfc198d4953d8080d422ae04d9b42863bfa1fc4423c45119529e9480ec028979df1680e205eaef05a622d6c0115292ad0a6d370d322a502253f9fa3afe6183ecee7744482ddf2214c0988adceffeba980282966b43028c3e206aac42ea4146d69c69ef472e3b6fc78b636809e4a0a71fdf7de1871ff2b5eb8a91a30e40df4001a382ee62a48d02b17b7d899d7f7a1aeff8f128de88c11db7b89171b0b85723778fa1402d4cbbe5b9c4a01ede3516032f1df235aaa3c7c67aa0ea3cc26cb29ca804141ac2d7a884b0a9cb30aa96f6552ef62a5cfabc168545577930eda3b2ba4ed340c9a946e1ce36595096ee52c14fdd7e0b0f1854c055ca14f1d1e0309b8e05e6fa730607179d41bbba3d9263a669e6804af2848c325e26137a7e5ddd5bee800902bb4e95cdf385b42dfa03af9de22b7aac2cc6c18b4fdcde1a2f89980652299362353c675ddaad583466f96453bf2a68ce8520868c5f2d59e13469ccdec0215d675042fc8dfd0c92ee333424b2b8e322ca7e58d44962a8db3dfbd38edbb3b2190e81abbe1689c2b775ecbaea2bf4c909b17073b42a059a468aaf72aba04ed431494a1ecb268c5061567f1284e5e2421e4b", 0x5e5}], 0x1, 0x0, 0xa0}], 0x1, 0x0) clone3(&(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:51:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8927, &(0x7f0000000180)={'syztnl2\x00', 0x0}) 10:51:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000015c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x20, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_SOCK={0x48, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8}]}]}, @TIPC_NLA_NODE={0x54, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "41b29268f9c770d0bb445d1a2188fff4e1a4a4f824"}}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NODE={0xdb8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "2a14851906bc48a4dd9f626f5f3a58dda42cb735636d684937"}}, @TIPC_NLA_NODE_ID={0xd51, 0x3, "97dd83bd68dbe97491d2d5b704020701580857e52bc5bd4ea58381f9b0dec1515df961908facd50283c08a3916fb4f0d90b11d52d66b55018e2fe7224aaf651ab9829b5fa281538a01597a51aad24bedf9ef30ffa0d18e543160f1ce97587459eb99cac94a88eea38e0f5706d7bb636697e9c3c05db46973128924e903a2bff9061ca3c60e29e5fc93b4f0ad993e1e078bb9b1a404df6fdab10644a2cde90b24f1901da4cc54b9e3d161e2559f1d28129ff0be012d0538c70d952b7ae102ece81446f1c873ad892a387e5850f4a18e519c7d6cff0c3994c1555985f216fe5d7cf6e95d590bb33bbc1358b50dfecb42d9c31c8803b4a2a0ab6ee260d4c8ad2357506b87b9e7866264281aaef3c1d13f0170ec91fec5547b5b71cac83ec6c17d538fcef42d4497dcdc48f5022769f3c78d6198721bd70735043563a8a47c41d598ee1b95ae2226b093fdbe19561803bc5eb329b6005fbb645cfb4769c661ec578d0209637cdefe1360f88dcdf06dce32e21aeef89e065fc575ec51498570050f10cade7b071272a1b25d30c800ba7f587ea7ea3d706d79813b1216df1ec7c8b3b3b4bfbdf6f530ab47b5ae1641b659b44943f55d141f6671012483f34a4f668df8cde44ed923b5052ca9b23a239f60bdc5c33514e15c096f4fa095f1f1e15a872baaae3d4c0fdbaf08221581135c9f84659d13992c5016d6ff91f7361d074c51b69467f8dc3086dddf250622b2ba035d9f83b45b1db2cf2872abb26f3a990a132684403bf28c37f0450acf89017b67ea358fb1f1cc550d1cf99c855879228182cbb8761e8c229450d9e2d4c61804b69ab33d1bd3ca118f8ef9cb231974356753543b36e61edc4930f62ed1fe6ec869eeaf965aee8f419b4cb8e379867ece2e1f90dc7b7e884adc614935768a6080bf129fc1e731527368732fe1445213b0209a1201424ae0f2c10483948c6889f113b5aca2e4bf5dc78385dca7a67dae992bb39fe20dbea79d0d09ff107c8acb05b2cd25e191a5ac8d8d2917b6ce9b3dc65e5ac4e166fc230b4105030491428a30ff6112e55b52422b7eb6610f66b74efd68c475f5bbb8658109f9a760744dd63b2f5ef1a7526925e2694dea74508103b5a7eb71e5747dcfca3bfa61f1040364db275bafa4f13f482b21f9459e8fc29fffd8e3e11eed0bfc8091c92f5151935744645b46e84079d32ec33fbebb42a98ec5270dea1fc4d4ba5174f3b7147916da467469c441cd35ac7258a5a1c1f70fc52f46bd7d7e8a8832261e7894aee6a0f07296bc81284e97568f7fe096acde1b06a1565801bb5796537823fc71eefa9b6b166c7e4d3bb843aa9b571e00cafe52c97648a0b8b506609d5bdae47d6a7596ea7ccc0ecd8ddbacc5066383f6505a01fbd015c297045d99b71e2f3f86477fcf56bc1fdd01ae1fd76a9c8d7c1819e4b00a53e3b215d2a2524873d6c56b0f25a86ea8b1b1076a52d0d7ccf20a1e2a54be9c3dc8272cd6f52b8cdae796f79cae742064726caea7fa56d9d93a8b9bf6e2f5e4be6353065de23d4f23db291b5b20a31f3f833d81f4b71a5b1356905b27886f9aa3961befade01da9590ca264c5def5639123c6919f7ae1868a7ae79e6a84b4b0e4599bed047cbfc2e4639daf714af88a2c197c4c2f7057dd4043171419065fc272f46174f747dbb9ebdf59c26b72f61fbd3b09951c8e22a8e2071dc794076fd1d26ac1ba8322d720f3cb4d4dd1c96c1b3364f83613a495a239a793c8f6f0f365199c5cea490c63f7a168acb96cdbba81bbe3b4847f35af0c20925f21cb9a927f765631df44f9ffc92ca11011a4816ea11d088f55f991ff1accf8b36d128dd341995b51941528f96ee5d6f21b9ab51fc44e0aee09bd7ba2b91903ff4dc538ec3a7fbf374e14a41d611bdf3d902c396d26e31f763862b02468cdda3d3882126fa18703f9323dad1d9b640cfef1cf745eaaca0287c2421605ff13a7f717b547e2aa0b7d94ac051c4aacc285dbd9a26de88fd740083fde44c4ebe3dda93c3f34eaf86310fa9a3a3a6cd86e09736966ad5da427cd3a49b4711a0a7c2a9e15051401bc46cb26285af149731cd6bf3141abe2b6463c2e0287b9ce4978986d0f44e08f9b62f0e177c19bd6bcc0b23c41ae97e165fbd51d8539e063f37682ff599788e25cd713e470db158928301c044d1c6705a9ebf5a46d9788a39b204aa1da10f74be4eabdc1455b5a2f5bf5b0761de2a877500da728df6fc2eeffd168cc43769bb0f0d910a2f2665633c1e9598a46cc948fa8595dc0e56deb0fbaee97f75774dc43c00a963448dab4f8973f93464d5e2b801752390a63840e84e98d6f2a29468e109b73f12e5db86ea3e0e7a99e94c52967461d772b3ca65bf623e64e20d2bb9851a6f22b4766211c93e8c70df9045ce253297ca192ef525495802fff659af1d547013a42bde72ad11a73161f8f63f3fa7892df0d5cc5a33b78d3ee047529b6f55bc710e12a337f467bb2ac1548df593d6bbbb5de3d11e7187916ffd8c756480d5953595d4915cc149a4ed2d0456acc8da79f97e1a901fefebe6c304de398558c38d813adaf288f6ea896676e9773a47c137e49e3f4d4e9f1fc680388786d0ed50e91ec6a9272ebd3b98f687e21391e311d6bd38e95222716635353487a55e05e1306ff8b3c05df6db53b5bfea99cd9e27e61c99aeb2ed9dacfc490f30058da326c1a72a3ce208c7e7c6abf7f8ac4de66525ea561fbebd95a27bde4e6f664ccb264e70654c640e1c3bd110224de4d0c29bf34c56863a917468461c304457c16cb83db2c75d4cf9d6feffa8c2df1340f4f801203c204fffe30d12e1a0d3644aad5a5830f74b962e2eee73a59c9dd18979e8433081921097844315f90565287134335cfccb078774b54f0e82073412d03a6b1812194a7fe86e71e177971e54a7fcd4aee6abe0a03f24771db42ef7f254437427e1542af37e15eb8202fd57ddc543317756f2b5ab56fc0adbd1b3fca2604f03b09660af0cb534fc6301267d8b9c1018df47fb8fe7038b03e936f579697bde607fffba4f8d48d8209d585fdd9b99424c7681f8adf47890836c4750611e30152837ac29b833ee27a7e4ed28bc300608f562c6f485362420c1b10166f2dc3f95c5bbe44c63a332cf07daba8fa7b532a4feac9cafab13e5e0fdec4f40951a4a796e2d61537d859dd22597d69b65638c320eaf303311fbc6da210b8d7b9a1fc6e121cc3fb3bb05fbed811ce89799c99b1e844775e4f7f43250c2cf86c895aae6a676cb2705e9fcbcce1d41fe7860e32034ba7ebc3de7cd1cfa15a343608d5d945f76029fbc784ad3f6a1b5fdfb819351a9fff52603f752e7e5d11653677b4d719bfefcc53ac3c42cee8d7ad95e29513335e439567b01fbce0ed9e990057d1a44668a025d629b9fd6ff61d6fe153f0eb23f5be1badabcc8843361971431c707d35a7a3114b135fc9388571394ded731fb90fe36fe5540d6f129c0ae6ccf4c4e1327dfb2abb046b7b78a55f6f5991c40d210d625b4981cc19a1e12bd9a952965436a8b1b363b6298b192dd46eb7f5622cd714b0557ae45865d75a8c18fdf37b359f167e9055fe1df817945ff59fce1e6eaed2f92217c17b92237be914f267c6a9c2701d0ae0c2f9968aa96df0fdb206707aed439927442d3d3bbbdb614dd9ba1d82835daaadc8dd7a01a1cf75426d4d7faeea7b709eb529669c27a57429bdd1b0d39fd3076b8248ed72afbca2bb88ffc81a4f8fbb7dcc248897bed0f821d60f99b9e5df65290eaea5a3fe05170ae6a1507291570be4e02dac44e1d15f5f607834236674d35d5ce3aee7fc574947c1f9c4b14d1c123ca6c9cf89e6438c791813780ff4194a79d51f60bed8cc1c4da4ad86e2bf727be3b975a32cb739cfc7ef2982f4290d5eff4156599cabb7b0d7820b2a79fe11d03e43fdb2944ff14974c8d8637e5a8f72f0fd223bdf55a85fa4c0f4dbc4f642eed9a9605f0532a57664cc9117ca09903ee951f5a882a026920f6dbbf1f9ad3ae805920057a6686e62f94f56ad075cc458d0009d0b5f94394417a3127e3d6d7761dccd844a1d1259a72fe369bb92cbad76ab4f14e73faef52eeec656829918163157ebc56df99fa8282b1537692f8701ff191d97f0696bdeb87e2f0912e561d1a343a5df7e46fe333b1fdfbfe748d3bb53d2688e6c176041b118789693d422b8d513d28b610bf8628dc1fb981284a01a6fbf79e897b76193d86e0f2b47d6538980fa9992ff4d5c72cc741f49f4ef83e548a49cb6e49949261a23b8da4c77b344ba09cbc99990b51dfbcd470041d21c0f5ce39d0c353805893e36e8e8927362c974c7fd6c34d7ea3b755369a22659c020fdf24424d90564a2fe0829dab3242d64d9bfb56b9789ad7ad0e4a6c2f299aa609e9e2e1d19847bd625585c7b2dc2b8b13e3d28657465ebad363893d9b194bcfdcd5ff9c69bdf7c07f9764d51178e8ceec53827e1376328c2e796b56f19f3b622f7f350824f17678fa6da3186b15772212944475ad2ac44cc2b92394c8c96420c7f6b2120e01f167475a86d5f6ed1c3435908fbcf2a93bdd56a6ee9296a32a72924575bc0fe11c89a1d16c0c3b362145c973be3017f558859b4ae7ea8e52db6b9b38fa83e36fe53737db3166fbb85468ec929d149fbc56ba9857b9cedfdb2ec87a116ec79b196e7ff64bcc60cb18fee2f4c03ac6c961b7b9202574a60f8868dac434ae75d2b0da307881a01ef85e6cb3b03b768e750903f346aed31abcedc328b631b150f0742415e5152f0d13bf0ab7a9ee29ce1b16976c44aee31bffa87512ba23b"}]}]}, 0xec4}}, 0x0) 10:51:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x526d0200) [ 219.612614][T12248] loop4: detected capacity change from 0 to 264192 [ 219.637764][T12248] FAT-fs (loop4): bogus number of FAT sectors [ 219.641822][T12268] loop2: detected capacity change from 0 to 264192 [ 219.643863][T12248] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 10:51:52 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f00000011c0), 0x10003, 0x0) [ 219.657952][ T25] audit: type=1326 audit(1624359112.471:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12261 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x5e6d0200) 10:51:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d", 0x3, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x1d, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 219.724486][T12268] loop2: detected capacity change from 0 to 264192 10:51:52 executing program 2: syz_read_part_table(0xfdfdffff00000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x2, 0x0, 0x0, 0xfffffffd}]}) 10:51:52 executing program 0: socketpair(0x9, 0x0, 0x0, &(0x7f0000000180)) [ 219.794718][T12302] loop4: detected capacity change from 0 to 264192 10:51:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x34, 0x2, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'snmp\x00'}]}, 0x34}}, 0x0) [ 219.828909][ T25] audit: type=1326 audit(1624359112.641:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12301 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 219.867282][T12302] FAT-fs (loop4): bogus number of FAT sectors [ 219.873402][T12302] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xef000000) 10:51:52 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x218001, 0x0) 10:51:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x21, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 219.890666][T12315] loop2: detected capacity change from 0 to 264192 10:51:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac", 0x5, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:52 executing program 3: syz_open_dev$vcsn(&(0x7f0000000040), 0x200005000, 0x10d000) 10:51:52 executing program 2: syz_read_part_table(0xfdffffff00000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000400)={0x14}, 0xfffffdef}}, 0x0) 10:51:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x24, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000003c0)={"6b9e812ed430add71a081f3a026e842a"}) [ 219.991713][T12337] loop4: detected capacity change from 0 to 264192 [ 220.001226][T12337] FAT-fs (loop4): bogus number of FAT sectors [ 220.007404][T12337] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xf4ffffff) 10:51:52 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0xfffffffffffffffd, 0x0, 0x0) 10:51:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac", 0x5, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 220.032055][T12350] loop2: detected capacity change from 0 to 264192 [ 220.063136][ T25] audit: type=1326 audit(1624359112.871:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12351 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:52 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0), 0x5, 0x26902) 10:51:52 executing program 3: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x15, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000def361b116dd4bb681391964ccf077da010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d0f4655fd2f4655fd2f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0}, {0x0}, {&(0x7f0000012700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012800)="02", 0x1, 0xc400}, {&(0x7f0000012900)="03", 0x1, 0xc800}, {&(0x7f0000012a00)="04", 0x1, 0xcc00}, {&(0x7f0000012b00)="05", 0x1, 0xd000}, {&(0x7f0000000140)="00000000000000410da362214c33a6f200010000000000000000000000e925f2be0000000000000000000000000000000008000000000000000000000000000000006d150854746831df4a12bc1b0b932b5bc851d0a16fdd27aa9681e092176c6ccdba9cbdb277f69c1ff5051b923b9baa5ab753f649aec81cea33fa21ed0c623efd8fc7501853ff2064da7dfc5ce061fa95589c77da1fdf5b0fea2fe345df467d4d38c0edf441f5bbbe9981bcaec71428e3a4e68d14a4559047b326", 0xbc, 0xd400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}, {&(0x7f0000012e00)="02", 0x1, 0x10400}, {&(0x7f0000012f00)="03", 0x1, 0x10800}, {&(0x7f0000013000)="04", 0x1, 0x10c00}, {&(0x7f0000013100)="05", 0x1, 0x11000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000e9", 0x15, 0x11400}], 0x0, &(0x7f0000013b00)) fchown(r0, 0xee01, 0x0) 10:51:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xf5ffffff) [ 220.108404][T12367] loop4: detected capacity change from 0 to 264192 [ 220.134450][T12367] FAT-fs (loop4): bogus number of FAT sectors [ 220.140589][T12367] FAT-fs (loop4): Can't find a valid FAT filesystem [ 220.147286][T12350] loop2: detected capacity change from 0 to 264192 10:51:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac", 0x5, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:53 executing program 2: syz_read_part_table(0xfeffffff00000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/unix\x00') syz_genetlink_get_family_id$team(&(0x7f0000000100), r0) [ 220.200701][T12380] loop3: detected capacity change from 0 to 1024 [ 220.218366][ T25] audit: type=1326 audit(1624359113.031:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12384 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xfbffffff) 10:51:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x28, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 220.218776][T12380] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 220.263163][T12380] Quota error (device loop3): find_block_dqentry: Quota for id 0 referenced but not present [ 220.273322][T12380] Quota error (device loop3): qtree_read_dquot: Can't read quota structure for id 0 [ 220.286427][T12397] loop4: detected capacity change from 0 to 264192 10:51:53 executing program 3: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x15, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000def361b116dd4bb681391964ccf077da010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d0f4655fd2f4655fd2f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0}, {0x0}, {&(0x7f0000012700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012800)="02", 0x1, 0xc400}, {&(0x7f0000012900)="03", 0x1, 0xc800}, {&(0x7f0000012a00)="04", 0x1, 0xcc00}, {&(0x7f0000012b00)="05", 0x1, 0xd000}, {&(0x7f0000000140)="00000000000000410da362214c33a6f200010000000000000000000000e925f2be0000000000000000000000000000000008000000000000000000000000000000006d150854746831df4a12bc1b0b932b5bc851d0a16fdd27aa9681e092176c6ccdba9cbdb277f69c1ff5051b923b9baa5ab753f649aec81cea33fa21ed0c623efd8fc7501853ff2064da7dfc5ce061fa95589c77da1fdf5b0fea2fe345df467d4d38c0edf441f5bbbe9981bcaec71428e3a4e68d14a4559047b326", 0xbc, 0xd400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}, {&(0x7f0000012e00)="02", 0x1, 0x10400}, {&(0x7f0000012f00)="03", 0x1, 0x10800}, {&(0x7f0000013000)="04", 0x1, 0x10c00}, {&(0x7f0000013100)="05", 0x1, 0x11000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000e9", 0x15, 0x11400}], 0x0, &(0x7f0000013b00)) fchown(r0, 0xee01, 0x0) 10:51:53 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) [ 220.318548][T12397] FAT-fs (loop4): bogus number of FAT sectors [ 220.324697][T12397] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2c, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c}, 0x1c}}, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) pipe2$9p(0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000540), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000d40), 0xffffffffffffffff) 10:51:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 220.388020][T12412] loop2: detected capacity change from 0 to 264192 [ 220.411896][ T25] audit: type=1326 audit(1624359113.221:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12420 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:51:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xfeffffff) [ 220.440740][T12421] loop3: detected capacity change from 0 to 1024 [ 220.451309][T12433] loop4: detected capacity change from 0 to 264192 [ 220.460717][T12421] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 220.466035][T12433] FAT-fs (loop4): bogus number of FAT sectors [ 220.477854][T12433] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:53 executing program 2: syz_read_part_table(0xfeffffffffffffff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 220.483376][T12421] Quota error (device loop3): find_block_dqentry: Quota for id 0 referenced but not present [ 220.494525][T12421] Quota error (device loop3): qtree_read_dquot: Can't read quota structure for id 0 10:51:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xff0f0000) 10:51:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:53 executing program 0: setrlimit(0x0, &(0x7f0000000140)={0x17e, 0x1000000}) [ 220.581976][T12453] loop2: detected capacity change from 0 to 264192 [ 220.606198][T12463] loop4: detected capacity change from 0 to 264192 [ 220.626232][T12463] FAT-fs (loop4): bogus number of FAT sectors 10:51:53 executing program 3: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x15, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000def361b116dd4bb681391964ccf077da010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d0f4655fd2f4655fd2f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0}, {0x0}, {&(0x7f0000012700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012800)="02", 0x1, 0xc400}, {&(0x7f0000012900)="03", 0x1, 0xc800}, {&(0x7f0000012a00)="04", 0x1, 0xcc00}, {&(0x7f0000012b00)="05", 0x1, 0xd000}, {&(0x7f0000000140)="00000000000000410da362214c33a6f200010000000000000000000000e925f2be0000000000000000000000000000000008000000000000000000000000000000006d150854746831df4a12bc1b0b932b5bc851d0a16fdd27aa9681e092176c6ccdba9cbdb277f69c1ff5051b923b9baa5ab753f649aec81cea33fa21ed0c623efd8fc7501853ff2064da7dfc5ce061fa95589c77da1fdf5b0fea2fe345df467d4d38c0edf441f5bbbe9981bcaec71428e3a4e68d14a4559047b326", 0xbc, 0xd400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}, {&(0x7f0000012e00)="02", 0x1, 0x10400}, {&(0x7f0000012f00)="03", 0x1, 0x10800}, {&(0x7f0000013000)="04", 0x1, 0x10c00}, {&(0x7f0000013100)="05", 0x1, 0x11000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000e9", 0x15, 0x11400}], 0x0, &(0x7f0000013b00)) fchown(r0, 0xee01, 0x0) 10:51:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000008c0)=ANY=[], 0x13d0}}, 0x0) 10:51:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xffefffff) 10:51:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:53 executing program 2: syz_read_part_table(0xff0f000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 220.632332][T12463] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x30, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:53 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 10:51:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x34, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xffffefff) [ 220.731753][T12488] loop3: detected capacity change from 0 to 1024 [ 220.766243][T12488] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 10:51:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_NODE={0xea4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "27b4ac5b745a81c80f20910afab6ce0acea978ac"}}, @TIPC_NLA_NODE_ID={0xe55, 0x3, "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"}]}]}, 0xec4}}, 0x0) 10:51:53 executing program 3: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x15, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000def361b116dd4bb681391964ccf077da010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d0f4655fd2f4655fd2f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0}, {0x0}, {&(0x7f0000012700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012800)="02", 0x1, 0xc400}, {&(0x7f0000012900)="03", 0x1, 0xc800}, {&(0x7f0000012a00)="04", 0x1, 0xcc00}, {&(0x7f0000012b00)="05", 0x1, 0xd000}, {&(0x7f0000000140)="00000000000000410da362214c33a6f200010000000000000000000000e925f2be0000000000000000000000000000000008000000000000000000000000000000006d150854746831df4a12bc1b0b932b5bc851d0a16fdd27aa9681e092176c6ccdba9cbdb277f69c1ff5051b923b9baa5ab753f649aec81cea33fa21ed0c623efd8fc7501853ff2064da7dfc5ce061fa95589c77da1fdf5b0fea2fe345df467d4d38c0edf441f5bbbe9981bcaec71428e3a4e68d14a4559047b326", 0xbc, 0xd400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}, {&(0x7f0000012e00)="02", 0x1, 0x10400}, {&(0x7f0000012f00)="03", 0x1, 0x10800}, {&(0x7f0000013000)="04", 0x1, 0x10c00}, {&(0x7f0000013100)="05", 0x1, 0x11000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000e9", 0x15, 0x11400}], 0x0, &(0x7f0000013b00)) fchown(r0, 0xee01, 0x0) 10:51:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x1, &(0x7f0000000240)=[{&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 220.779985][T12504] loop2: detected capacity change from 0 to 264192 [ 220.788220][T12510] loop4: detected capacity change from 0 to 264192 [ 220.806710][T12510] FAT-fs (loop4): bogus number of FAT sectors [ 220.812817][T12510] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:53 executing program 2: syz_read_part_table(0xffefffff00000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3c, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xfffffff4) 10:51:53 executing program 0: socketpair(0x0, 0xdc1797547bd66554, 0x0, 0x0) 10:51:53 executing program 0: msgget(0x0, 0x784) [ 220.907670][T12527] loop4: detected capacity change from 0 to 264192 [ 220.924200][T12530] loop3: detected capacity change from 0 to 1024 [ 220.935251][T12527] FAT-fs (loop4): bogus number of reserved sectors [ 220.941814][T12527] FAT-fs (loop4): Can't find a valid FAT filesystem [ 220.949675][T12541] loop2: detected capacity change from 0 to 264192 10:51:53 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='maps\x00') 10:51:53 executing program 2: syz_read_part_table(0xffffffff00000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 220.963139][T12530] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 10:51:53 executing program 3: syz_open_dev$loop(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 10:51:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x1, &(0x7f0000000240)=[{&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xfffffff5) 10:51:53 executing program 0: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x800}, 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x1000]}, 0x8}) 10:51:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3d, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:53 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100), &(0x7f0000000140)=0x10) 10:51:53 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x1ec02) [ 221.082250][T12561] loop2: detected capacity change from 0 to 264192 [ 221.116458][T12580] loop4: detected capacity change from 0 to 264192 10:51:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xfffffffb) 10:51:53 executing program 2: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:54 executing program 0: syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x610801) 10:51:54 executing program 3: sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x0) [ 221.132201][T12580] FAT-fs (loop4): bogus number of reserved sectors [ 221.138808][T12580] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x44, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:54 executing program 0: process_vm_writev(0x0, &(0x7f0000000700)=[{&(0x7f0000000480)=""/60, 0x3c}], 0x1, 0x0, 0x0, 0x0) 10:51:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x1, &(0x7f0000000240)=[{&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xfffffffe) 10:51:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c}, 0x1c}}, 0x0) syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000d40), 0xffffffffffffffff) [ 221.239795][T12605] loop2: detected capacity change from 0 to 264192 10:51:54 executing program 0: prlimit64(0x0, 0x0, 0x0, &(0x7f0000001740)) r0 = fork() process_vm_writev(r0, &(0x7f0000000380)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/223, 0xdf}], 0x2, &(0x7f00000015c0)=[{&(0x7f00000005c0)=""/4096, 0x1000}], 0x1, 0x0) 10:51:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x45, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:54 executing program 2: syz_read_part_table(0xffffffffffffffff, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0xffffffff) [ 221.295250][T12619] loop4: detected capacity change from 0 to 264192 [ 221.309196][T12619] FAT-fs (loop4): bogus number of reserved sectors [ 221.315772][T12619] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:54 executing program 3: pipe2$9p(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000440)={0xb}, 0xb) 10:51:54 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000140)) 10:51:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) [ 221.416244][T12651] loop4: detected capacity change from 0 to 264192 [ 221.423009][T12646] loop2: detected capacity change from 0 to 264192 10:51:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c, 0x80000) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000080)=""/23, 0x17}], 0x1, 0x7, 0x80000001) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:51:54 executing program 0: select(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x0, 0x2710}) 10:51:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x48, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 221.465782][T12651] FAT-fs (loop4): bogus number of reserved sectors [ 221.472612][T12651] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x13d0}}, 0x0) 10:51:54 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4c, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:54 executing program 0: syz_open_dev$vcsn(&(0x7f0000000880), 0x8000004, 0xa0c00) 10:51:54 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4040840}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0x1fdb}], 0x1, 0x0, 0x0) 10:51:54 executing program 3: pipe2$9p(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 10:51:54 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 10:51:54 executing program 3: process_vm_writev(0x0, &(0x7f0000000500)=[{0xfffffffffffffffe}], 0x1, 0x0, 0x0, 0x0) [ 221.623616][T12693] loop2: detected capacity change from 0 to 1 [ 221.633491][T12695] loop4: detected capacity change from 0 to 264192 [ 221.656711][T12695] FAT-fs (loop4): bogus number of reserved sectors [ 221.663318][T12695] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:54 executing program 0: syz_open_dev$loop(0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 10:51:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x100000002) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[], 0x208e24b) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f00000004c0)=ANY=[], 0x208e24b) getsockopt$inet_int(r6, 0x0, 0xd, &(0x7f0000000000), &(0x7f0000000240)=0x4) write$binfmt_elf64(r6, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/179, 0xb3}, {&(0x7f0000000040)=""/65, 0x41}], 0x2, 0x0, 0x9) 10:51:54 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4d, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 221.689217][T12693] loop2: detected capacity change from 0 to 1 10:51:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000004c0)) 10:51:54 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$nl_netfilter(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) [ 221.771519][T12735] loop2: detected capacity change from 0 to 1 [ 221.781755][T12733] loop4: detected capacity change from 0 to 264192 10:51:54 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={r0}, 0x0) 10:51:54 executing program 3: r0 = getpgrp(0x0) process_vm_writev(r0, &(0x7f0000000700)=[{&(0x7f0000000480)=""/60, 0x3c}], 0x1, &(0x7f0000000900)=[{&(0x7f0000000740)=""/234, 0xea}, {0x0}], 0x2, 0x0) [ 221.814980][T12733] FAT-fs (loop4): bogus number of reserved sectors [ 221.821604][T12733] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x50, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:54 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200080) [ 221.872999][T12735] loop2: detected capacity change from 0 to 1 10:51:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x54, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 221.935512][T12767] loop4: detected capacity change from 0 to 264192 [ 221.949185][T12767] FAT-fs (loop4): bogus number of reserved sectors [ 221.955716][T12767] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) 10:51:54 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x5c, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000000580)={0x3, &(0x7f0000000500)=[{0x5, 0x54, &(0x7f00000003c0)="e199064fe0070230cbd6c33001b2642ca87e03b8ef11b165caa6f18309ef34ff747170dd6d639fb19ac7b75a77573acc8ef8a0a0b76c570a4c171364606cafa79765024c1885422e0a29ba4bd353e6df7d11a54e", 0x0, 0x1}, {0x80000000, 0x98, &(0x7f0000000440)="7476154b5a9317d49a47367293ca6d3c2ca0d35b70c7e4e75b2d5f7a467fa9cf008021775dba517431b3d71f27eeeb39b80bb31130938dca4e306d5b48ff1d606bdd8667fa133093b79b2bc9978fbcacae3872457f3eea166c9bb52516719995f600e03b67fa6eb1303f906aadf511c0757991e9e70a5ab4677b59ee91d272cfa3ecc5592e765f61dac116aa641af42c84bc647a099b47dc", 0x0, 0x2}, {0x0, 0x5, &(0x7f0000000240)="b9880c954b", 0x1}]}) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x2, 0xffffffffffffffff, &(0x7f00000002c0)="09d806fe599259e8b3f7e92b44b1068f215069432d3714f8d0174b78922555d8a28bf7fa075bb7a57f593d31bc95851994d3a59da8c5cefadd781b0efb7d167ea72dc95eb44bd9c665270ae305a68bfe8e9062f2761f1267e04010433d43f53644e1027dd93fcde8778a3146ef10d5d88f57324c5906f700ed8ba56a4dcf3ed3b9a119f0f450bcbdca733f2e9a074b24d7524f0d9d38206c67fa16627183d0033d714d4663ca886a8e9533182f7d97f61172f7835402d7325b5ef8ed4bd1859971366af2deb5730e1eb0cc4f5f1cdef598cf1ba018f56f8134484880c24a", 0xde, 0x10000, 0x0, 0x1, r0}, &(0x7f0000000200)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f0000000600)={0xfffffffffffffff8, 0x28, '\x00', 0x1, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000000640)='memory.high\x00', 0x2, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000000)=0x3) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:51:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 222.199429][T12792] loop4: detected capacity change from 0 to 264192 [ 222.206476][T12794] loop2: detected capacity change from 0 to 1 [ 222.214199][T12792] FAT-fs (loop4): bogus number of reserved sectors [ 222.220751][T12792] FAT-fs (loop4): Can't find a valid FAT filesystem [ 222.289120][T12809] loop4: detected capacity change from 0 to 264192 [ 222.314499][T12809] FAT-fs (loop4): bogus number of reserved sectors [ 222.321067][T12809] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:55 executing program 0: socketpair(0xa, 0x0, 0x80000001, &(0x7f0000000500)) 10:51:55 executing program 2: syz_read_part_table(0x0, 0x6, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 10:51:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x60, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174", 0xb}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r0, 0xffffffffffffffc0, 0x7, 0x6}) r2 = openat$cgroup_ro(r1, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/vlan/vlan1\x00') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.events\x00', 0x100002, 0x0) openat(0xffffffffffffffff, 0x0, 0x54080, 0x40) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x6628, 0x0) preadv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:51:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x61, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000002c0)={0x3ff, 0x3a, 0x20, 0x68, 0xffffffff, 0x3}) sendfile(r2, r1, &(0x7f0000000040)=0xd614, 0x3) preadv(r2, &(0x7f0000000240), 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) flistxattr(r2, &(0x7f0000000340)=""/119, 0x77) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x100000002) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="00fbf40103e3c75d4b7cad1b8ca7ef76f1d4c85e583b2446a4a98dcfe845e3aca905d53bf20e4b1b4786e5fffbbc30621266d0835fe459cd742581c9e1c65e47520d810f127daadd5b4181adf32a6bac52f065fbb2dfb1ca520d3257aa83dcd069facda303aacd21b7800541d69e6403252fd3fa2460b3a16de4c01a32f84b580a781fd47eee7d5340e52ca9fc3863bb0454956e239c92681b7429698533b41b2a69f2f703f2e0538d2a9a5da7b72d9c469e59f9237a57b0219b997473d0f0495d9c984688790b44a1f1e2919074cacb80a9b3dbe25114e6377f96eacc75455b487b3af148"], 0xf4, 0x1) 10:51:55 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') 10:51:55 executing program 0: modify_ldt$read_default(0x2, 0x0, 0xa542169abff507cc) [ 222.716446][T12829] loop4: detected capacity change from 0 to 264192 [ 222.725356][T12829] FAT-fs (loop4): bogus number of reserved sectors [ 222.731908][T12829] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174", 0xb}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:55 executing program 3: modify_ldt$read_default(0x2, &(0x7f0000000000)=""/14, 0xe) 10:51:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x64, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 222.775293][T12840] loop2: detected capacity change from 0 to 1 [ 222.859236][T12863] loop4: detected capacity change from 0 to 264192 [ 222.885965][T12863] FAT-fs (loop4): bogus number of reserved sectors [ 222.892513][T12863] FAT-fs (loop4): Can't find a valid FAT filesystem [ 222.899394][T12840] loop2: detected capacity change from 0 to 1 10:51:55 executing program 2: syz_read_part_table(0x0, 0x7, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:55 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) 10:51:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x100000a, 0x8010, 0xffffffffffffffff, 0xc4c78000) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@rand_addr=0x64010100, 0x4e22, 0x200, 0x4e22, 0x5, 0xa, 0xa0, 0x0, 0x2b, 0x0, r3}, {0x100, 0x9, 0x23f, 0x3, 0x101, 0x10000, 0x0, 0xffffffff80000000}, {0x9, 0x400, 0x10000, 0x8001}, 0xaed, 0x6e6bb2, 0x1, 0x1, 0x4, 0x1}, {{@in=@loopback, 0x4d3, 0x2b}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3507, 0x0, 0x3, 0x5, 0x80000001, 0x200, 0x5}}, 0xe8) preadv(r2, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/200, 0xc8}], 0x1, 0x0, 0x0) 10:51:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x6c, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:55 executing program 3: syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x10000) 10:51:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174", 0xb}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:55 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) syz_open_dev$loop(0x0, 0x0, 0x0) 10:51:55 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) 10:51:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 10:51:55 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000706c0)) 10:51:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000200)='cgroup\x00') [ 223.026996][T12894] loop4: detected capacity change from 0 to 264192 [ 223.039584][T12894] FAT-fs (loop4): bogus number of reserved sectors [ 223.046199][T12894] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r3, 0x43740000) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) write$binfmt_script(r4, &(0x7f0000000340)={'#! ', './file0', [{0x20, 'memory.events\x00'}, {0x20, 'memory.events\x00'}], 0xa, "ca1565b26c2b85dbcf6dc7a6da8748bad8e37ad33f0e89e8019ef9e86ff111a27a5f074b7bb26bf94fa7b4c721f91086feaea9b34fac8dbf37d5c364167ad08caa01cfc224c8f284f5d8bdada6e227fb3903e34020ca83e61c80eabaa9e50ed2ceba7555a1359394a6f1fb1652f833eda34b115f11cf136afeb368c10c6700a6467b1f0ac7dd2b5c5f1eeaf6f3bbb6b812042812ab11cae635e1577836a795c50af2da03c40918cfb383971486498ae8b83e75a4bdb5fd3eb35d4dd8f110894fb042e812bb4ba46d12434af59fab8a4c28dbc2f94b644fbca1beeede4c0715ab"}, 0x109) r5 = fork() perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x3f, 0x7, 0x1, 0x0, 0x100000004, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x8, 0x8aee}, 0xe080, 0x0, 0x7ff7ffff, 0x8, 0x7a, 0x3, 0x1000, 0x0, 0xffffffff, 0x0, 0x8d}, r1, 0x4, r3, 0x0) r6 = openat$cgroup_ro(r2, &(0x7f00000004c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r7, r6, 0x0, 0x100000002) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x7, 0x3, 0x9, 0x0, 0x0, 0x3, 0xb000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x77, 0x1, @perf_bp={&(0x7f0000000480), 0x9}, 0x93cb410a5c5ff5, 0x5, 0x4, 0x0, 0x3ef92376, 0x7fffffff, 0x8000, 0x0, 0x8, 0x0, 0x6}, r5, 0x3, r6, 0x9) [ 223.094365][T12909] loop2: detected capacity change from 0 to 1 10:51:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x74, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:56 executing program 2: syz_read_part_table(0x0, 0x8, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:56 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x80800) 10:51:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a02", 0x11}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r0) 10:51:56 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x100000002) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x80, 0x6, 0x8, 0x4, 0x3f, 0x0, 0x594b, 0x12, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x10112, 0x5f, 0x2, 0x0, 0x4, 0x80000000, 0xfff7, 0x0, 0x1, 0x0, 0x8}, r0, 0xb, 0xffffffffffffffff, 0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r3, r2, 0x0, 0x100000002) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f00000004c0)=ANY=[], 0x208e24b) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000002) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xda00) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x6628, 0x0) preadv(r6, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:51:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x7c, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000fc0)={0x14}, 0x14}}, 0x0) [ 223.230312][T12946] loop2: detected capacity change from 0 to 1 [ 223.240798][T12943] loop4: detected capacity change from 0 to 264192 10:51:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, 0x0) 10:51:56 executing program 0: sched_rr_get_interval(0x0, &(0x7f00000000c0)) fork() r0 = fork() process_vm_writev(r0, &(0x7f0000000380)=[{&(0x7f0000000240)=""/223, 0xdf}], 0x1, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/117, 0x75}], 0x1, 0x0) [ 223.274345][T12943] FAT-fs (loop4): invalid media value (0x00) [ 223.280380][T12943] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:56 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/unix\x00') ioctl$LOOP_GET_STATUS(r0, 0x4c03, 0x0) 10:51:56 executing program 3: sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x69b6a2d696e9bb6b) 10:51:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a02", 0x11}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 223.359451][T12946] loop2: detected capacity change from 0 to 1 10:51:56 executing program 2: syz_read_part_table(0x0, 0xf, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:56 executing program 0: syz_open_dev$vcsn(&(0x7f0000000880), 0x0, 0x600040) 10:51:56 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/sockstat\x00') socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) [ 223.454819][T12992] loop4: detected capacity change from 0 to 264192 [ 223.471268][T12992] FAT-fs (loop4): invalid media value (0x00) [ 223.477300][T12992] FAT-fs (loop4): Can't find a valid FAT filesystem [ 223.498753][T12998] loop2: detected capacity change from 0 to 1 [ 223.593493][T12998] loop2: detected capacity change from 0 to 1 10:51:56 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000240), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r0, 0x6, 0x80000001, 0x2}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/cgroups\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) signalfd(r2, &(0x7f0000000000)={[0x9]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.swap.current\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x100000002) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f00000004c0)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRESHEX], 0xda00) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6628, 0x0) preadv(r7, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:51:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a02", 0x11}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000240)) 10:51:56 executing program 0: r0 = fork() process_vm_writev(r0, &(0x7f0000000380)=[{&(0x7f0000000140)=""/243, 0xf3}], 0x1, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/117, 0x75}], 0x1, 0x0) 10:51:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x87, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:56 executing program 2: syz_read_part_table(0x0, 0xfe, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x5393, 0x0) 10:51:56 executing program 0: fchownat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0xee01, 0x0, 0x1000) 10:51:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8947, &(0x7f0000000040)={'syztnl2\x00', 0x0}) [ 223.690679][T13025] loop4: detected capacity change from 0 to 264192 [ 223.710494][T13025] FAT-fs (loop4): invalid media value (0x00) [ 223.716505][T13025] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:56 executing program 0: socketpair(0x2, 0x3, 0x5, &(0x7f00000003c0)) 10:51:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000e40)={0x14, 0x12, 0x0, 0xe01}, 0x14}}, 0x0) 10:51:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x94, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 223.756767][T13043] loop2: detected capacity change from 0 to 1 10:51:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x100000002) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:51:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000ec0)={&(0x7f0000000e00), 0xc, &(0x7f0000000e80)={0x0}}, 0x0) 10:51:56 executing program 2: syz_read_part_table(0x0, 0x300, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a02000274", 0x14}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x9c, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:56 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x125e, 0x0) 10:51:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000a40)={&(0x7f00000008c0), 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0x64, r1, 0x401, 0x0, 0x0, {}, [{{@nsim={{0x50}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}, {0x6}, {0x8}}]}, 0x64}}, 0x0) 10:51:56 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 10:51:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xa4, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 224.012593][T13080] loop2: detected capacity change from 0 to 1 [ 224.034502][T13089] loop4: detected capacity change from 0 to 264192 10:51:56 executing program 2: syz_read_part_table(0x0, 0xffa, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:56 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000000)=""/166, 0xa6) 10:51:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') preadv2(r0, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/224, 0xe0}], 0x1, 0x0, 0x7fff, 0x0) [ 224.091673][T13089] FAT-fs (loop4): invalid media value (0x00) [ 224.097773][T13089] FAT-fs (loop4): Can't find a valid FAT filesystem [ 224.240786][T13113] loop2: detected capacity change from 0 to 1 10:51:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000004c0)=ANY=[], 0x208e24b) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400), 0x4000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(r0, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0) preadv(r5, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) r6 = openat$cgroup_freezer_state(r4, &(0x7f0000000040), 0x2, 0x0) preadv(r6, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f0000000240)=""/61, 0x3d}, {&(0x7f00000002c0)=""/218, 0xda}], 0x3, 0x1, 0x7) 10:51:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a02000274", 0x14}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xac, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ppoll(&(0x7f0000001180)=[{r0}], 0x1, &(0x7f00000011c0)={0x77359400}, 0x0, 0x0) 10:51:57 executing program 2: syz_read_part_table(0x0, 0x7b00, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 224.787051][T13137] loop4: detected capacity change from 0 to 264192 [ 224.796581][ T25] kauditd_printk_skb: 19 callbacks suppressed [ 224.796610][ T25] audit: type=1326 audit(1624359117.611:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13135 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 224.826530][T13137] FAT-fs (loop4): invalid media value (0x00) 10:51:57 executing program 0: socketpair(0x25, 0x3, 0xfffffffe, &(0x7f0000000340)) 10:51:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a02000274", 0x14}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 224.832714][T13137] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xb1, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:57 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') read$char_usb(r0, &(0x7f0000000080)=""/192, 0xc0) 10:51:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:57 executing program 0: openat$sysfs(0xffffff9c, &(0x7f00000005c0)='/sys/kernel/rcu_normal', 0xa881, 0x0) [ 224.936239][T13158] loop4: detected capacity change from 0 to 264192 10:51:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x0, 0x1, 0xf, 0x8, "4c8cb7df6d5e1db1defac26f0478f549e36da24f1c3552a37a3cd912801b2db0122a29da6ec3227b9739380e8313a7caf05fdb48a01fb9fa81942e130b90e1a2", "a7c57d3546c1cd36ffbe6c525348854c77de1434fb92c76ecc06555ebb33206a", [0xfffffffa]}) [ 224.985618][T13158] FAT-fs (loop4): invalid media value (0x00) [ 224.991676][T13158] FAT-fs (loop4): Can't find a valid FAT filesystem [ 225.023558][ T25] audit: type=1326 audit(1624359117.831:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13166 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 225.093754][T13141] loop2: detected capacity change from 0 to 1 10:51:58 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f0000004400), 0x8, 0x0) 10:51:58 executing program 0: syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) openat$vcs(0xffffff9c, &(0x7f0000000380), 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) 10:51:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400", 0x15}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x2, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:58 executing program 2: syz_read_part_table(0x0, 0xfffe, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:58 executing program 0: pipe2$9p(&(0x7f00000051c0), 0x0) 10:51:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='devices.list\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r3) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20}, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000280)='./file0\x00', 0xf3, 0x6, &(0x7f00000015c0)=[{&(0x7f00000002c0)="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", 0x1000, 0x210000000}, {&(0x7f00000012c0)="66b17ea55029c04d76dc5f6b7dd567daec543a562f5462fe32623b9b3ea89367bd0a0931ea7da73fd8f712ec53fe74f08409005b49119b21e969aab52fef30d8e3fb5a5595c5aead9a87194ee179809aaef8ab77cfb03515439a492f135122ed6004662d719c6b3fc1d82b84862ee3f30722d949bef32c0d8fac39dc35563933c02d9f1d0efb90152b8a88c733de9685198c5736be935959680e9ff378ef6443e0c96d8d54fbcd3a13fa6d", 0xab, 0x3ff}, {&(0x7f0000001380)="a4c3f05b95abce95feb39a48f9a4b5eae5ea415227ce5ca0bebcd1d93859c1db49f75cca9dafc38cefe4acf82a66b5ffde9f91700bc89a1ea5de502de8822812814c4325dc153cd407da687db943c0b66218fbd67dcfd3cfb6d52012108041ff5198d32d4a6f0abce6ce00845d570a5f36351941d1a9dbf17c65cd5268aa221b416c09f7d44e6e37e1d1e4471577eba26abedf0df0c281155dc7bdeb6cdc946c7f4bcb110d39a60b", 0xa8, 0x4}, {&(0x7f0000001440)="c66ac045d887adff0e01daf0d08850a0643569ef8815f99228292972dbc8c8c07a9d7d6582333ea7f1bfb4d23c73fa28d948d90e38ae05ec34696df134eabadfec38f1018f5bccd163cf42085150d7e3fbf1d60aecbd300693ec06", 0x5b, 0x40}, {&(0x7f00000014c0)="9250be82ef4f828c299a407741a7979ae3bc56a17570c2538b40a0a10435931c62a625cc9d0c56a09fe0180d55fb1f54b5d54cceb8d00aaaad850621912d989eb2e12551773d30e0057b944b903c1dbd59cb8ffa", 0x54, 0x3}, {&(0x7f0000001540)="f50ad9ae4af86dddb1ee0d07bff9fdcf78c3e553ea328f00966762d9e1a524c29143b0646a33356e9350e0cc75dea709c7cca800b1ad2e6fe95ccebd73239cea82e495409941ed6ca423e1a6b8", 0x4d, 0xfff}], 0x8480, &(0x7f00000017c0)={[{@gid}, {@huge_never}, {@gid={'gid', 0x3d, r3}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x39, 0x70, 0x74, 0x6d, 0x31, 0x2d]}}, {@huge_always}, {@size={'size', 0x3d, [0x13, 0x35, 0x70, 0x70]}}], [{@euid_lt}]}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002480)=0x0) r5 = gettid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x0, &(0x7f0000002b80)={0x0, 0x0, 0x4}) getresuid(&(0x7f00000024c0), &(0x7f0000002500), &(0x7f0000002540)=0x0) statx(r0, &(0x7f0000002600)='./file0\x00', 0x100, 0x20, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002780)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000440)=[{&(0x7f00000002c0)="f85faca74a2b3271c53d3404c38c34e4f96fa437eb98485b41d617b113a39dde92501e6c5629b05925d0c7f9fa441da79b5335ebbe1a0d8ac72cec0b65e73aef5824910af8bdbee9fa77ecd40a72b9041351a7e2fb92f29104a9e4bb8ad22686dd6d2d404ee8910681821c0226ba7fbc2deefe37060081d43e27d097edde300b256af966a85bf5753270cd18a4d4eb0fa6efa8f987dc530b76dc62957bdfdb4653e1b8e4691cb5616e33b88963c515c720afb5c9d506c6f567c9beb4c64e", 0xbe}, {&(0x7f0000000200)="6805e15cd601a0969e840b3f7d27f5629bca9f15b1aba4117ee6cff65b1f240ffd9bc5edc9e64dac27756527c1c493e6030fdf947f734f89dfe30c74b59ea9bcef258b31a6b42004800ef1bc1e579b846a2e18685f25e3ac161845ff2d3e38bcce8eaf940affa188c48d8ec2183e4bb2209c837d63fe9736", 0x78}, {&(0x7f0000000380)="7048c0b33a0e6731d8cf94ec526645ad86dc9544456547714f9296f7f4208746542b624daf0316922a79670e3a02dba504b93be62d0cb75376c9283fce73a7b0e4705165273f178c4b207a7f5b15ebe209f0a5f08cd349c55755e51eb32567df34c6b05596cbd49897e1f4d9523b2a96", 0x70}, {&(0x7f0000000400)="d395", 0x2}], 0x4, &(0x7f0000000480)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}], 0xc0, 0x80}, {&(0x7f0000000540)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000a00)=[{&(0x7f00000005c0)="0d3133ded361396ab9f883ed22a7b241dc26890392d15cfb586be8ac242e6ae11dfb5de6fec17e496c99017b89ef0dd436bd5f1e4ad51f4738a23a53331c213e", 0x40}, {&(0x7f0000000600)="98dcad381281c569cb9bb079261e52bdc36e33c22fb56ffecca954e4ead860da64cdf06354c222e85b2d223f5a104a5125d1028afc697695972828b1584b5d866568fd37e6d94cea032c54f0812bcd16db8d47733558916598f69d151b827632c4c70b156bae4bea24a85a4d239383f450e79386044cbed2d9b41b6ef37fd7a0c0fb5a62518bea832cb68210c297d4725b492f7dbfbff69ea55a331b98f0625094414e04ba3ae490c444e1d06087766ab492c771cb369dfec37aef3edef6088084681f843bc71c0d00203ac8d9d3b7c7c98bf05784e49d1f711b6ff9292fedfa01e74076a04453de641123fdb02dc7a14f3d656d", 0xf4}, {&(0x7f0000000700)="66d5463fafae1f50ec339d1b97e6ab0431977241cb7dfa1237b32627ffc0e7314aef56d49cea6e9c3bf0f406f8bcc0b30700305c4d25a9ef1ea4b6695f12e010bc790dc98db25592ec0cfaecaabed60d9b381ffed4", 0x55}, {&(0x7f0000000780)="d12ba8c86441f36032e15786293e1a659538b7d23de2f983639d7cee00d1e800c0bcfb4f6527f493d280bda4774475185562e6eda77d36ae67665e32551b59f675bb19b3b0b167ec40f268184735fc1a54fc5aba78f2d7bb697d6b796f1e526911f3ea4c79ef91f9640f31aef416573fc59b610d3ac1d15c184de96f5572c7492edb1ac8d30481791c22cbc02af53edc25b534447de5a392144c9a7358c22f8ae320e708e6280cb54583bc3acf49e0", 0xaf}, {&(0x7f0000000840)="3bf949f0450508fc9964025226cf18decb0e89ce7cf36d1ead4e82d9ae2df00b155f92b8b86a1f6d9609157810f89fcec150025028a8602b2e9a3e6b2106d61c6534b3ccace28b45681b9dc46fb5b036e11a33e2601160ce54413cb5360c48add8e1dbe6065d2ccd92d1ac4791d829036c7902f352f84f0cf160d8d932c3658ead5fa4274adcef00a2fdfe878ec63e266571e911f4cc46908e0f8a", 0x9b}, {&(0x7f0000000900)="5cddb8509989fd52f06c46599a730313f6e144cef0d0833d545f1b8194f195842dd9ff00b7283a7b1e0d697fd288994b90ad2fe811867fa335cd695763d44a670929357c195eee04a5d2a4db82c2cab1386ee4b1033cdc41386e80b60b4825801f246eecc2200d9c798a648d9b56bf4b9b3262acc5808d43c883ecd842f85ba65380fd504951ea89f48e587627559075f77bfc6ce47755d7dc3adc903345650bfa870e38f046a4060d714f2b4a6b32c2551382d276a02113b8d18517cabd145ce84e517801dfe792a8d3101fbe37c86ebf6ed5d8a1c218514c83a12ebb1be3cc", 0xe0}], 0x6, &(0x7f0000000b00)=[@rights={{0x20, 0x1, 0x1, [r0, 0xffffffffffffffff, r1, 0xffffffffffffffff]}}], 0x20, 0x44000}, {&(0x7f0000000b40)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001e00)=[{&(0x7f0000000bc0)="97ec44526cf76400c229eb2553758bd9568a8ad8b1801e5a607351d0ac0ae6f758b7ac3e01390800ea58dd4acf88ff2ca6625bf93cc2ced00d97d0d16fa5499db0220317db4ff5d758d33803218f40458f4eba4c47003c4d362cd8fe0bcbb0844adaf65f331580e91add27b94885", 0x6e}, {&(0x7f0000000c40)="9ca17c91bcf955e833206f54f961dd5da88d36ba3477bae0f69a1228e61b3c8dc6a4308e120cbe556dc9f3000cac2e0a17871905f0e3cba9cf1887dd794fd63ffe8718c4e240e83d777a7bbe87bd22e3d56462df4b48564ba4568262f4e11cf3ab8cb83a0e14fdca26e829d6d7cea996e8cac052e8a37bf42f04f73de95bb0ce12569ca0e5cd7763c65601bdf603669b2d63d7872f00639d490a87b36b73bd7ad2371e559125a00a26a6c4c28d40", 0xae}, {&(0x7f0000000d00)="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", 0x1000}, {&(0x7f0000001d00)="fd56990b87471445cefe11e627049aa59ed0d30f3758c8ec1ddf7e91e976cc6e91c83a9becb6c9c7b60c35f6bb822d5a785007c19a265b4cb7d7dfca197ab4d77c77963755fb0d1b0e47aac211d274846d191252587c370f4fbf777748653eb6967784654e2cc9ffecb755e6c6c949db9e3c3e864025b3f91a6b3fbaa0a4d35c7f9677f6e919d067d9289506f26f1787d0290dbb807c1033d0044c77aec609d6112fe8bfeaa46331321adea38dc8872016893b33e3e910e547f2b15e2694738fb4eff2ade74b4ea84e27d67752", 0xcd}], 0x4, &(0x7f0000001e80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x60, 0x10}, {&(0x7f0000001f00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002400)=[{&(0x7f0000001f80)="d9ccf593a2d7dd81ccefcc7e78637c4b8ef25818dd0815a41259ee4c157a4c5e276b96666ae0fb5d253094accd84e60b796f244bc64c802da75de4a80fa8c7311b431007653035fe6d97c0a70f3787e891ee0013d86a9c71537f2ff784074a1f8d4f0d631ffdc893aecb80779d8b385d8f64217235a463ac7ce7927eb8d273a8cae2d94588462d9dfc4b011e23f0fe6475", 0x91}, {&(0x7f0000002040)="0f095c35df47e9b9b6fe547a4d140ce692169d9f6960b5c568b80ba87558677539f3fd9bb6c1aa3509cdd3d07f8339588975a79dc95645bca1ec3cf7a16920ca1b59cb7ee8ff4963eaa6ea8eb5eacaa03e9418ca3571b73287bcc0f24f5496a21d7d3075bb96bc5c4f8245830e915e47813d145669991588298d25e2aa92a23229", 0x81}, {&(0x7f0000002100)="b18741f21ab737ae15f571ce0ffb9d9eb5e3a4ff6b9ce4b90547b02b96ce9bb37624d1dd63c0bf3c56b8ee37ec1bef9e208d2480230fb9bfcb9107b2f2944981d703d7a68065b6266c0f8a66c5fb4be1a4e5f5ddf7e102ae0e01c92d3ee2f73ea775c5cf51a02612f6755f520689876ad4640cfb8d1fc1c0b60ae5b7d93ee7ea928f8e85d4c8eb6a7bf4bd520e521e201a99aceb92084cb48925b423bda9fe729af5f5e5bc2f8dee1cb9d6eedbf7b5e0883c853e63e75935c6d92bc9", 0xbc}, {&(0x7f00000021c0)="274e0b504ff7dcd98157ee370460c22b6b744caf219f399da4625ef4e7dd78a0b7b7eeaa2ce8d129a70775c40c23ec5dbe16c0b3dfe4919da39ef6b12a73969ba66929011246ae611e1508ce8186", 0x4e}, {&(0x7f0000002240)="64a0eb455dd3cf602dfc3b367cc7c697453072f9b1c3ac5ed5d8201ad3b9d701a4ed2f9915ed909d783bd797305b3c6b49f2a0210bd8a0938bc124a989d0161671a481500afcb14418c428686fdba05d3b93310b57433f2a1aa567340d393f1d6e3b22935337aca0811ac0259e86b62ec8b90d1ba35451dc03c6114be70e3d558153379dbd5cb17d587c0795bdabc372a04a", 0x92}, {&(0x7f0000002300)="dd27d9039688d321853cac3e1a6c9271f58d1c533d2c0b923ea332c71abb3d10d69024189f1eb30f59294b7350297340f6414e8b4870470dbcf70bb25e066520f3b4ebb86e4586fd7a180a186db313e5f4799fff6febfd002188137fc0f6bcacb8621d26d74e3a9f1b3364fdafe6a2ff82a5038836d3eadb5109a291ad03d6ec4761854bf79d79ca9491fc09fc63fab672b5fbb26b7a3d97032f939861497f1c5b709f2fd68259d445b1a6055f7bcaaf31ba4a252ef34d067c8dc79db2979c0841abc63a8a9237630c795641df939da83cfd4471cbd0fe03a9edb64140198553137303597052ac418d24d7bcec3a302a5d14", 0xf2}], 0x6, &(0x7f0000002740)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r5, r7, r8}}}], 0x40, 0x48050}], 0x4, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:51:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x3, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:58 executing program 3: socketpair(0x15, 0x0, 0x0, &(0x7f0000000000)) fdatasync(0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 10:51:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x4, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 225.306383][T13200] loop4: detected capacity change from 0 to 264192 [ 225.325745][T13200] FAT-fs (loop4): invalid media value (0x00) [ 225.331748][T13200] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:58 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x400c12f5, 0x0) [ 225.385924][T13215] loop1: detected capacity change from 0 to 258048 [ 225.421764][T13215] tmpfs: Bad value for 'nr_inodes' 10:51:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400", 0x15}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x5, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)={0x50, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x40, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x19, 0x0, 0x0, 0x0, @binary="f445ac821a7515e0b6f1b84d8585fc182cb86e4c73"}, @generic="4618b0a861c6f1e2acabfc36f537db2ca0a6afaeeb608915"]}]}, 0x50}], 0x1}, 0x0) 10:51:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') dup3(r1, r0, 0x0) 10:51:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x7) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)={0x4c, 0x0, 0x20, 0x70bd2b, 0x3, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x58}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1e}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_REG_RULES={0x18, 0x22, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}]}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8004}, 0x8000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 225.536928][T13239] loop4: detected capacity change from 0 to 264192 [ 225.550587][T13239] FAT-fs (loop4): invalid media value (0x00) [ 225.556623][T13239] FAT-fs (loop4): Can't find a valid FAT filesystem [ 225.723626][T13202] loop2: detected capacity change from 0 to 1 10:51:58 executing program 2: syz_read_part_table(0x0, 0x7ffffff9, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:58 executing program 0: r0 = socket(0x2, 0x3, 0x7) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={0x0, 0x5c}}, 0x0) 10:51:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x6, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1276, 0x0) 10:51:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x17) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:51:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400", 0x15}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x7, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, 0x0) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000a40)={&(0x7f00000008c0), 0xc, &(0x7f0000000a00)={0x0}, 0x300}, 0x0) 10:51:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x8, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 225.854076][T13277] loop4: detected capacity change from 0 to 264192 [ 225.874932][T13277] FAT-fs (loop4): invalid media value (0x00) [ 225.881148][T13277] FAT-fs (loop4): Can't find a valid FAT filesystem 10:51:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f00000043c0)={0x0, 0x0, 0x0}, 0x0) 10:51:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, 0x0) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 226.030373][T13304] loop4: detected capacity change from 0 to 264192 10:51:59 executing program 2: syz_read_part_table(0x0, 0xfffffffe, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:51:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r2, r1, 0x0, 0x100000002) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x12, r2, 0x6b4fc000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x2240, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000080)='io.stat\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0) preadv(r5, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) close(r4) 10:51:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000000)={'gre0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="6772657461703000000043a7ebabe7ec28000000", @ANYRES32]}) 10:51:59 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f00000003c0), &(0x7f0000000840)={0x7}, &(0x7f0000000880)={0x9}, 0x0, 0x0) 10:51:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x9, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, 0x0) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:51:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c03, 0x0) 10:51:59 executing program 0: syz_open_dev$loop(&(0x7f0000000000), 0x8, 0x282) 10:51:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0xc, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:51:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x100000002) fcntl$setlease(r4, 0x400, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) fchdir(r1) preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000002c0)=""/196, 0xc4}], 0x1, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000040)=0x28e) [ 226.810437][T13331] loop4: detected capacity change from 0 to 264192 10:51:59 executing program 3: io_uring_setup(0x1fb2, &(0x7f0000000080)={0x0, 0x0, 0x17, 0x1}) 10:51:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 226.983986][T13356] loop4: detected capacity change from 0 to 264192 [ 226.995875][T13356] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 227.050625][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:52:00 executing program 2: syz_read_part_table(0x0, 0xffff8881071db118, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:52:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8916, &(0x7f0000000040)={'syztnl2\x00', 0x0}) 10:52:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x14, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xbb}], 0x1, 0x4, 0x0) 10:52:00 executing program 3: syz_io_uring_setup(0x781b, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 10:52:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:52:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0xffffffffffffffff) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r3, r2, 0x0, 0x100000002) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x40010, r2, 0x8fee6000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x6628, 0x0) preadv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x15, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:00 executing program 0: setresuid(0xee00, 0x0, 0xee01) getresuid(&(0x7f0000000540)=0x0, &(0x7f0000000040), &(0x7f0000000080)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0xffffffffffffffff, r0, 0x0) ioctl$TIOCL_BLANKSCREEN(r1, 0x4b32, 0x0) [ 227.720211][T13387] loop4: detected capacity change from 0 to 264192 [ 227.730694][T13387] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:52:00 executing program 3: syz_io_uring_setup(0x781b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2b5}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) openat$null(0xffffff9c, 0x0, 0x0, 0x0) 10:52:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 10:52:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x16, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 227.789786][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 227.848937][T13409] loop4: detected capacity change from 0 to 264192 [ 227.858143][T13409] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 227.879046][ T4727] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:52:01 executing program 2: syz_read_part_table(0x0, 0xffff88812c396998, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:52:01 executing program 0: socketpair(0xa, 0x2, 0x1a, &(0x7f00000003c0)) 10:52:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ppoll(&(0x7f0000001180)=[{}, {r0}, {r0}], 0x3, &(0x7f00000011c0)={0x77359400}, 0x0, 0x0) 10:52:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 10:52:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x1c, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:01 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) 10:52:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) r2 = openat$incfs(r1, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x40) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000008, 0x13, r2, 0xef) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x6628, 0x0) preadv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 10:52:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x1d, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 228.655296][T13439] loop4: detected capacity change from 0 to 264192 [ 228.665793][T13439] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:52:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv2(r0, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/224, 0xe0}], 0x1, 0x0, 0x7eff, 0x0) 10:52:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc) 10:52:02 executing program 2: syz_read_part_table(0x0, 0xffffc90000000000, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:52:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 10:52:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x21, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:02 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "7ed8d98770228e2a2d4a58e702a79b22921703106d29474662b326decabc290508f9ab86b67fcb4a568638ba8d7640ddbdbaa5f32d5307d3fc49f4fc3ef998a9", "ad68c8674eb6baa14bbfa7be98c2621d0755b34c55cee5ad73d611928108a050"}) 10:52:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000009c40)={0x1, &(0x7f0000009c00)=[{}]}) 10:52:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x8) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x6628, 0x0) preadv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 10:52:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x24, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:02 executing program 3: io_uring_setup(0x7397, &(0x7f0000000000)) io_uring_setup(0x5585, &(0x7f0000000080)) 10:52:02 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="e0010000120005ee"], 0x1e0}}, 0x0) 10:52:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x25, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, 0x0, 0x0) [ 229.576726][T13490] loop4: detected capacity change from 0 to 264192 [ 229.596272][T13490] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:52:02 executing program 3: r0 = syz_io_uring_setup(0x781b, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) fcntl$addseals(r0, 0x409, 0x0) [ 229.710013][T13525] loop4: detected capacity change from 0 to 264192 [ 229.719333][T13525] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 229.728613][T13495] relay: one or more items not logged [item size (48) > sub-buffer size (9)] 10:52:03 executing program 2: syz_read_part_table(0x0, 0xfffffffffffffffe, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:52:03 executing program 0: pipe2(&(0x7f00000028c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0xfffffffffffffd4e) 10:52:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x28, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, 0x0, 0x0) 10:52:03 executing program 3: socketpair(0xa, 0x2, 0x88, &(0x7f00000003c0)) 10:52:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) write$cgroup_int(r1, &(0x7f0000000000)=0x6, 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:03 executing program 0: r0 = syz_open_dev$char_raw(&(0x7f0000000040), 0x0, 0x80c0) ioctl$CHAR_RAW_FLSBUF(r0, 0x1261, &(0x7f0000000000)=0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0xd8083, 0x184) 10:52:03 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x1) utimensat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) 10:52:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f00000002c0)={[{0x2b, 'cpu'}, {0x2d, 'pids'}, {0x2d, 'io'}, {0x2b, 'pids'}, {0x2d, 'rdma'}, {0x2b, 'cpu'}]}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000240)={r3, 0x5f7a0342, 0x0, 0x2}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x37, 0x4b, 0x0, 0x1, 0x0, 0xffff, 0x2b349, 0xa, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x1, @perf_bp, 0x1, 0x100000001, 0x100, 0x6, 0xfffffffffffffff7, 0x1, 0x5, 0x0, 0x10000, 0x0, 0x7}, 0x0, 0x8, r4, 0x9) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x2c, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000200)={[{@fat=@check_strict}]}) mkdirat(r2, 0x0, 0x0) 10:52:03 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000028c0)={[{@size={'size', 0x3d, [0x74]}}]}) [ 230.540374][T13548] loop4: detected capacity change from 0 to 264192 [ 230.560024][T13548] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 230.636561][T13572] loop4: detected capacity change from 0 to 264192 [ 230.646356][T13572] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:52:04 executing program 2: syz_read_part_table(0x0, 0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:52:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x8916, 0x0) 10:52:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x2d, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:04 executing program 4: r0 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x3, &(0x7f0000000080)=':\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) 10:52:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x14, 0x50, r0, 0x7a48b000) 10:52:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x100000002) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x30, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x34, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x2, 0x5) fallocate(0xffffffffffffffff, 0x10, 0x0, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) [ 231.491385][ T25] audit: type=1326 audit(1624359124.302:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13595 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 231.569564][ T25] audit: type=1326 audit(1624359124.332:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13596 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 231.612539][ T25] audit: type=1326 audit(1624359124.422:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13609 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:05 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x2, 0x1c0}]) 10:52:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x35, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$binfmt_misc(r0, &(0x7f00000012c0)={'syz0', "7ecce57da1545a79a7dd1320db5b0874368d4950056a8ab0b3af34aa1e8ac02003e34ce3152842afe8b2254e93b4cca148aac4912fda2e62437dbd496bb526c538bc3c7fd4b888b9c1757aa77c6b7bba79d0902f307196f2221f65071be5f47b315ff055dbe683f2ed25d76b57be565e25db53a048a1dd9f11d199790c52a5fad5a35f1b0b6bc417b8183af08da5591751bd36996d04325061161b19e2edf0953a6a655cc961c9e083d4060757ede1531632a8c5af17d9bba2f816f57d"}, 0xc1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f0000000140)=[{&(0x7f0000000000)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x2, 0x1, 0x0) 10:52:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x100000002) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 10:52:05 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x3, 0x1c0}]) 10:52:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x3c, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 232.348349][ T25] audit: type=1326 audit(1624359125.162:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13626 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 232.373333][ T25] audit: type=1326 audit(1624359125.182:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13629 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f0000000000), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x9f, 0x5, 0xff, 0xff, 0x0, 0xe96, 0x20600, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x7f, 0x4, 0x9, 0x100000001, 0x1000, 0x2, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x3) 10:52:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 10:52:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:05 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x1c0}]) 10:52:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x3d, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 10:52:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.state\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000004c0)=ANY=[], 0x208e24b) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xbb}], 0x1, 0x0, 0x0) [ 232.513998][ T25] audit: type=1326 audit(1624359125.322:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13652 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 10:52:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x100000002) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x44, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) 10:52:05 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x5, 0x1c0}]) 10:52:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 10:52:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000004c0)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(r1, &(0x7f00000003c0)='cpuset.effective_cpus\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x100000002) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRESOCT=r2, @ANYRES32, @ANYRESHEX=r0, @ANYRESHEX=r3, @ANYRES16=r0], 0xda00) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="280003001d00f50000000001000000250a0010040000000000000000060000000000000000000099"], 0x28}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000240)='./file0\x00', 0xe002, 0x1) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x6628, 0x0) preadv(r5, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r7, r6, 0x0, 0x100000002) write$binfmt_script(r7, &(0x7f0000000400)={'#! ', './file0/file0', [{0x20, '^{@/#'}, {0x20, '\':'}], 0xa, "62e7db7520f05ed9d07d6720106c5fe503938b2ca7529c5bd12b019311f5e909788aa89c4b5b2c603982176bd2f924490d34ca624c85c961795c3be073268d616bd5c9680b906ba52127e390038f8cb43fa3025345c81e36e09c0ded1abb44aa4c"}, 0x7b) 10:52:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) 10:52:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 10:52:06 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x6, 0x1c0}]) 10:52:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x45, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) 10:52:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x48, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x100000002) 10:52:06 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x7, 0x1c0}]) 10:52:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x4c, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) 10:52:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {}]}) 10:52:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) syz_open_dev$vcsn(&(0x7f0000000180), 0xc2, 0x243) signalfd(r1, &(0x7f0000000140)={[0x9]}, 0x8) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000380)={{r1}, 0x0, 0x2, @unused=[0xfff, 0x10001, 0x81, 0xffe0000000], @devid}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000100)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100000000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f0000000240)={0x2018}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f0000000000)=[{&(0x7f00000013c0)=""/187, 0xbb}], 0x1, 0x40000, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000002) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000001380)={0x2}) 10:52:06 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x8, 0x1c0}]) 10:52:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x4d, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) 10:52:06 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1c0}]) 10:52:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x28a01, 0x80) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {}]}) 10:52:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x100000002) 10:52:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) 10:52:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x50, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:07 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xa, 0x1c0}]) 10:52:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {}]}) 10:52:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000000)) write$binfmt_script(r3, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'memory.events\x00'}, {0x20, 'memory.events\x00'}, {0x20, '.\xd2!'}, {0x20, '#'}, {0x20, 'memory.events\x00'}, {0x20, '\xd4]\\*%#!^+/'}, {0x20, 'memory.events\x00'}, {0x20, 'memory.events\x00'}, {0x20, '\xc5'}, {0x20, 'memory.events\x00'}], 0xa, "a8a031ae187d85bbc949c5aba6065d5f1ddb80fd15fc6ba7fa09d210cd3b6976466fe9ddd455566cd2d38cdd41c452fd4ceb5654a8fdafcb19fc76c03f3f09901749a61430ac485aee5a14b0a0b9345738e48959500e"}, 0xce) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x12, r0, 0x41f4e000) 10:52:07 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xb, 0x1c0}]) 10:52:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}]}) 10:52:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x54, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {}, {}]}) 10:52:07 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xc, 0x1c0}]) 10:52:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x42800, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x2b, 'memory'}, {0x2b, 'memory'}, {0x2d, 'memory'}, {0x2b, 'memory'}, {0x2b, 'io'}, {0x2d, 'rdma'}]}, 0x2a) openat$incfs(r1, &(0x7f0000000000)='.pending_reads\x00', 0x10000, 0x0) 10:52:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x100000002) 10:52:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x5c, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}]}) 10:52:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {}, {}]}) 10:52:08 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xd, 0x1c0}]) 10:52:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) r4 = fsmount(r0, 0x0, 0x81) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r4, 0x8008330e, &(0x7f0000000040)) 10:52:08 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xe, 0x1c0}]) 10:52:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x60, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}]}) 10:52:08 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xf, 0x1c0}]) 10:52:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {}, {}]}) 10:52:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000240)=0x1e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x4, 0x40, 0x41, 0x6, 0x0, 0x1, 0x109c, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000000), 0x9}, 0x10010, 0x9, 0x0, 0x5, 0x9, 0x1ff, 0xff, 0x0, 0xbf2, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, r2, 0x8) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x61, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:08 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x10, 0x1c0}]) 10:52:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {}]}) 10:52:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {0x6}]}) 10:52:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x100000002) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000012c0)={0x1, 0x2, 0x1000, 0x48, &(0x7f0000000000)="a3c4cdc732aba38f3b65e2ee0a7f332c1410e560b299414cddd837232156872996abe91b7560e86eadd6d21c1be128d9b48dc4fb3e4e830e86e0e87ab687b653219d88d8af0096d8", 0x1000, 0x0, &(0x7f00000002c0)="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"}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {0x6}]}) 10:52:08 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x11, 0x1c0}]) 10:52:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {}]}) 10:52:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x64, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:08 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x12, 0x1c0}]) 10:52:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}, {0x6}]}) 10:52:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {}]}) 10:52:09 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x25, 0x1c0}]) 10:52:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x6c, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) 10:52:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) ioctl$SNAPSHOT_FREE(r1, 0x3305) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r3, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r4 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r3, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000004ac0)=""/102389, 0x18ff5}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r4], 0xc63b9e35) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r4, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xc080}, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSBRK(r1, 0x5427) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x5, 0x1, 0x8, 0x3, 0x0, 0x7f, 0x20000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x460, 0x1, 0x0, 0x4, 0x0, 0xfffffffb, 0x3, 0x0, 0x4, 0x0, 0x8}, 0x0, 0x4, r0, 0x2) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x74, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:09 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x48, 0x1c0}]) 10:52:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {0x6}]}) [ 236.298229][ T25] audit: type=1326 audit(1624359129.112:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13883 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) 10:52:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x7c, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {0x6}]}) 10:52:09 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x4c, 0x1c0}]) [ 236.378821][ T25] audit: type=1326 audit(1624359129.192:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13900 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:09 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x55, 0x1c0}]) 10:52:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {0x6}]}) 10:52:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) [ 236.479700][ T25] audit: type=1326 audit(1624359129.292:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13916 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 236.599614][T13893] ================================================================== [ 236.607741][T13893] BUG: KCSAN: data-race in setattr_copy / vfs_write [ 236.614308][T13893] [ 236.616611][T13893] write to 0xffff8881067fd5f0 of 2 bytes by task 13908 on cpu 0: [ 236.624299][T13893] setattr_copy+0x1af/0x1c0 [ 236.628781][T13893] ext4_setattr+0x5ea/0xec0 [ 236.633284][T13893] notify_change+0x8a3/0xa80 [ 236.637860][T13893] chmod_common+0x11c/0x250 [ 236.642342][T13893] __x64_sys_fchmod+0xac/0xf0 [ 236.646997][T13893] do_syscall_64+0x4a/0x90 [ 236.651392][T13893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 236.657264][T13893] [ 236.659657][T13893] read to 0xffff8881067fd5f0 of 2 bytes by task 13893 on cpu 1: [ 236.667270][T13893] vfs_write+0x4ae/0x770 [ 236.671486][T13893] ksys_write+0xce/0x180 [ 236.675704][T13893] __x64_sys_write+0x3e/0x50 [ 236.680444][T13893] do_syscall_64+0x4a/0x90 [ 236.684841][T13893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 236.690786][T13893] [ 236.693094][T13893] value changed: 0x8000 -> 0x8088 10:52:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) preadv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) [ 236.698088][T13893] [ 236.700387][T13893] Reported by Kernel Concurrency Sanitizer on: [ 236.706522][T13893] CPU: 1 PID: 13893 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 236.715273][T13893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.725433][T13893] ================================================================== 10:52:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) keyctl$dh_compute(0x10, &(0x7f0000000100), 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000004c0)=ANY=[], 0x208e24b) ioctl$VT_ACTIVATE(r3, 0x5606, 0x1) 10:52:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x84, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:09 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x68, 0x1c0}]) 10:52:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) 10:52:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) preadv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x6c, 0x1c0}]) 10:52:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x87, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 237.158593][ T25] audit: type=1326 audit(1624359129.972:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13941 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x74, 0x1c0}]) 10:52:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) 10:52:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x94, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 237.287791][ T25] audit: type=1326 audit(1624359130.052:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13940 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 237.373138][ T25] audit: type=1326 audit(1624359130.062:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13952 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 237.397000][ T25] audit: type=1326 audit(1624359130.162:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13962 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='io.stat\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x100000002) openat(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x9c, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x7a, 0x1c0}]) 10:52:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) 10:52:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) preadv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x90, 0x1c0}]) [ 237.557920][ T25] audit: type=1326 audit(1624359130.372:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13976 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0xa4, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/slabinfo\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[], 0x208e24b) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000240)={{0xf7, 0x80}, 0x0, 0xffffffe1, 0xffffffff, {0x7f, 0x1}, 0x40, 0x400}) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='cgroup.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f00000004c0)=ANY=[], 0x208e24b) openat$cgroup_ro(r4, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6628, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/psched\x00') 10:52:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xfe, 0x1c0}]) [ 237.640023][ T25] audit: type=1326 audit(1624359130.402:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13978 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0xac, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) [ 237.705493][ T25] audit: type=1326 audit(1624359130.442:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13991 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 237.732373][ T25] audit: type=1326 audit(1624359130.482:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14000 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x204, 0x1c0}]) [ 237.786366][ T25] audit: type=1326 audit(1624359130.522:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14007 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 237.820849][ T25] audit: type=1326 audit(1624359130.632:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14020 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0xb1, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x300, 0x1c0}]) 10:52:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000240)='hugetlb.2MB.limit_in_bytes\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000080)=[{&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f00000002c0)=""/213, 0xd5}, {&(0x7f00000003c0)=""/76, 0x4c}], 0x3, 0x6, 0x9) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x402, 0x1c0}]) 10:52:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) 10:52:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x406, 0x1c0}]) 10:52:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x500, 0x1c0}]) 10:52:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r3, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x0, 0xfffffffc}, {}, {0x6}]}) 10:52:11 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x600, 0x1c0}]) 10:52:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x2, 0xfffffffc}, {}, {0x6}]}) 10:52:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) write$P9_RFSYNC(r2, &(0x7f00000002c0)={0x7, 0x33, 0x1}, 0x7) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r1, 0xc0286687, &(0x7f0000000080)={0x2, 0x59, 0x4c, &(0x7f0000000000)=""/76}) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:11 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x604, 0x1c0}]) 10:52:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x3, 0xfffffffc}, {}, {0x6}]}) 10:52:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005500)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/134, 0x86}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0xffffffff}, {{&(0x7f0000001380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000240)=""/38, 0x26}, {&(0x7f0000001400)=""/105, 0x69}, {&(0x7f0000001480)=""/18, 0x12}, {&(0x7f00000014c0)=""/224, 0xe0}], 0x4, &(0x7f0000001600)=""/23, 0x17}, 0x451}, {{&(0x7f0000001640)=@can, 0x80, &(0x7f0000001a40)=[{&(0x7f00000016c0)=""/130, 0x82}, {&(0x7f0000001780)=""/8, 0x8}, {&(0x7f00000017c0)=""/192, 0xc0}, {&(0x7f0000001880)=""/19, 0x13}, {&(0x7f00000018c0)=""/69, 0x45}, {&(0x7f0000001940)=""/98, 0x62}, {&(0x7f00000019c0)=""/111, 0x6f}], 0x7, &(0x7f0000001ac0)=""/109, 0x6d}, 0x7}, {{&(0x7f0000001b40)=@nl=@proc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/161, 0xa1}], 0x1, &(0x7f0000001cc0)=""/189, 0xbd}, 0x6}, {{0x0, 0x0, &(0x7f0000002440)=[{&(0x7f0000001d80)=""/230, 0xe6}, {&(0x7f0000001e80)=""/201, 0xc9}, {&(0x7f0000001f80)=""/249, 0xf9}, {&(0x7f0000002080)=""/231, 0xe7}, {&(0x7f0000002180)=""/221, 0xdd}, {&(0x7f0000002280)=""/68, 0x44}, {&(0x7f0000002300)=""/68, 0x44}, {&(0x7f0000002380)=""/149, 0x95}], 0x8}, 0x7fffffff}, {{&(0x7f00000024c0)=@alg, 0x80, &(0x7f00000037c0)=[{&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/249, 0xf9}, {&(0x7f0000003640)=""/84, 0x54}, {&(0x7f00000036c0)=""/216, 0xd8}], 0x4, &(0x7f0000003800)=""/50, 0x32}, 0x79}, {{&(0x7f0000003840)=@isdn, 0x80, &(0x7f0000003e00)=[{&(0x7f00000038c0)=""/105, 0x69}, {&(0x7f0000003940)=""/117, 0x75}, {&(0x7f00000039c0)=""/86, 0x56}, {&(0x7f0000003a40)=""/154, 0x9a}, {&(0x7f0000003b00)=""/241, 0xf1}, {&(0x7f0000003c00)=""/162, 0xa2}, {&(0x7f0000003cc0)=""/17, 0x11}, {&(0x7f0000003d00)=""/58, 0x3a}, {&(0x7f0000003d40)=""/61, 0x3d}, {&(0x7f0000003d80)=""/84, 0x54}], 0xa, &(0x7f0000003ec0)=""/151, 0x97}}, {{&(0x7f0000003f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000004000)=""/93, 0x5d}, {&(0x7f0000004080)=""/137, 0x89}, {&(0x7f0000004140)=""/83, 0x53}, {&(0x7f00000041c0)=""/4096, 0x1000}], 0x4}, 0x5}, {{&(0x7f0000005200)=@in6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @initdev}}, 0x80, &(0x7f00000053c0)=[{&(0x7f0000005280)}, {&(0x7f00000052c0)=""/247, 0xf7}], 0x2, &(0x7f0000005400)=""/253, 0xfd}, 0x4}], 0x9, 0x12000, &(0x7f0000005740)) recvfrom$unix(r3, &(0x7f0000005780)=""/19, 0x13, 0x40000000, &(0x7f00000057c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x100000002) 10:52:11 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x700, 0x1c0}]) 10:52:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1}, {}, {0x6}]}) 10:52:11 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x900, 0x1c0}]) 10:52:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x7, 0xfffffffc}, {}, {0x6}]}) 10:52:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240), r1) write$binfmt_script(r1, &(0x7f00000004c0)=ANY=[], 0x208e24b) openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$TIOCNOTTY(r1, 0x5422) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x7ff) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x2b, 'io'}, {0x2b, 'pids'}, {0x2d, 'io'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'rdma'}, {0x2b, 'io'}, {0x2d, 'io'}, {0x2d, 'io'}, {0x0, 'cpu'}]}, 0x31) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x100000002) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f00000002c0)=0x80000001) 10:52:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r3, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1}, {}, {0x6}]}) 10:52:11 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xa00, 0x1c0}]) 10:52:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x9, 0xfffffffc}, {}, {0x6}]}) 10:52:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1}, {}, {0x6}]}) 10:52:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x14, 0xfffffffc}, {}, {0x6}]}) 10:52:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r3, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:12 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xb00, 0x1c0}]) 10:52:12 executing program 0: syz_read_part_table(0xa319000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:52:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r3, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x124) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:12 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xc00, 0x1c0}]) 10:52:12 executing program 0: syz_read_part_table(0xa319000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:52:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x2}, {0x6}]}) 10:52:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r3, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:12 executing program 0: syz_read_part_table(0xa319000000000000, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 10:52:12 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xd00, 0x1c0}]) 10:52:12 executing program 4 (fault-call:0 fault-nth:0): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x8) 10:52:12 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xe00, 0x1c0}]) 10:52:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) openat(r1, 0x0, 0x112e03, 0xab) r3 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x2010, r3, 0xd0b74000) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:12 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xf00, 0x1c0}]) 10:52:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x3}, {0x6}]}) 10:52:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) r3 = accept4$unix(r2, 0x0, &(0x7f0000000040), 0x800) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x50, r2, 0x8000000) syz_io_uring_setup(0x6289, &(0x7f0000000240)={0x0, 0xd440, 0x8, 0x3, 0x274}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000002c0), &(0x7f0000000300)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000440)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x80000001, 0x0, &(0x7f0000000340)="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", 0x6, 0x0, 0x0, {0x2}}, 0x400) sendfile(r5, r4, 0x0, 0x100000002) ioctl$BTRFS_IOC_RESIZE(r3, 0x50009403, &(0x7f0000000080)={{r4}, {@val, @actul_num={@val=0x2b, 0x7, 0x45}}}) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:12 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x1100, 0x1c0}]) 10:52:12 executing program 0 (fault-call:0 fault-nth:0): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) [ 239.719989][T14199] FAULT_INJECTION: forcing a failure. [ 239.719989][T14199] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 239.733066][T14199] CPU: 0 PID: 14199 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 239.741827][T14199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.751873][T14199] Call Trace: [ 239.755140][T14199] dump_stack+0x137/0x19d [ 239.759466][T14199] should_fail+0x23c/0x250 [ 239.763872][T14199] should_fail_usercopy+0x16/0x20 [ 239.768945][T14199] _copy_from_user+0x1c/0xd0 [ 239.773552][T14199] do_seccomp+0x360/0x1530 [ 239.777982][T14199] ? __cond_resched+0x11/0x40 [ 239.782668][T14199] ? fput+0x2d/0x130 [ 239.786559][T14199] ? ksys_write+0x157/0x180 [ 239.791056][T14199] ? fpregs_assert_state_consistent+0x7d/0x90 [ 239.797115][T14199] __x64_sys_seccomp+0x3c/0x50 [ 239.801893][T14199] do_syscall_64+0x4a/0x90 [ 239.806370][T14199] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 239.812248][T14199] RIP: 0033:0x4665d9 [ 239.816119][T14199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 239.835711][T14199] RSP: 002b:00007ff36b600188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 239.838959][T14201] FAULT_INJECTION: forcing a failure. [ 239.838959][T14201] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 239.844122][T14199] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 239.844137][T14199] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 239.873066][T14199] RBP: 00007ff36b6001d0 R08: 0000000000000000 R09: 0000000000000000 [ 239.881020][T14199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 239.889168][T14199] R13: 00007fffa4b407cf R14: 00007ff36b600300 R15: 0000000000022000 [ 239.897200][T14201] CPU: 1 PID: 14201 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 239.905953][T14201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.916015][T14201] Call Trace: 10:52:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r3, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x4}, {0x6}]}) 10:52:12 executing program 4 (fault-call:0 fault-nth:1): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:12 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x1200, 0x1c0}]) [ 239.919281][T14201] dump_stack+0x137/0x19d [ 239.923608][T14201] should_fail+0x23c/0x250 [ 239.928072][T14201] should_fail_usercopy+0x16/0x20 [ 239.933125][T14201] _copy_from_user+0x1c/0xd0 [ 239.937715][T14201] do_seccomp+0x360/0x1530 [ 239.942128][T14201] ? __cond_resched+0x11/0x40 [ 239.947295][T14201] ? fput+0x2d/0x130 [ 239.951182][T14201] ? ksys_write+0x157/0x180 [ 239.955807][T14201] ? fpregs_assert_state_consistent+0x7d/0x90 [ 239.961945][T14201] __x64_sys_seccomp+0x3c/0x50 [ 239.966708][T14201] do_syscall_64+0x4a/0x90 [ 239.971140][T14201] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 239.977117][T14201] RIP: 0033:0x4665d9 [ 239.981014][T14201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.000613][T14201] RSP: 002b:00007f730a202188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 240.009032][T14201] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 10:52:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002780)='net_prio.prioidx\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000004c0)=ANY=[], 0x208e24b) fcntl$getflags(r3, 0x408) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) sendfile(r1, r0, &(0x7f0000000240)=0x1f, 0x7) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r3, 0xfa868000) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r6, r5, 0x0, 0x100000002) ioctl$TIOCGISO7816(r5, 0x80285442, &(0x7f0000000040)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x6628, 0x0) preadv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) r7 = syz_mount_image$iso9660(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x29345e7, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000340)="235b95ada83929374500c1138871d350e9722289e3449b66a6731a9f8696531380dc64ac072264a7dd834be851166f38f727ead9208376d90d65f3fc98e57d5f04041f9a4ab1ecbc5ed31765b6026af65a482ee53a313f4d21a55d639a5f611733c2ce739c6d92a488357e89491006e1adafb71beb561170b3204198b73ac7d2fff290eb392bd530dee233c17b55fb6a1f1f006401f57de2bacee923c065d4977a73e5132d6b92c90bdc2310f1e66f54e1165549aeeb8cbdbb3ac34b2a1dc3d2f9f3d3ddb98b", 0xc6, 0xa1c}, {&(0x7f0000000440)="aed1a8434a0e9c89fa7d511959462969d66aedd80db9f9b22555a5042b3099f73364dd28c7bfd61d1490bc87a02bbc", 0x2f, 0x200}, {&(0x7f0000000480)="ac08b24098d3d88ce8555d79d2472c995356848454877c", 0x17, 0x7}], 0xa40480, &(0x7f00000027c0)=ANY=[@ANYBLOB="667466382c6e6f636f6d70726573732c7375626a5f757365723d3a242c7065726d69745f646972656374696f2cb3c4072b99657569643e", @ANYRESDEC=0xee00, @ANYBLOB=',measure,smackfsfloor=^-.,\x00']) preadv(r7, &(0x7f0000002700)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/6, 0x6}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/178, 0xb2}, {&(0x7f00000026c0)=""/45, 0x2d}], 0x5, 0x8, 0x800) [ 240.016990][T14201] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 240.025043][T14201] RBP: 00007f730a2021d0 R08: 0000000000000000 R09: 0000000000000000 [ 240.033019][T14201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.041175][T14201] R13: 00007ffccd22d2ff R14: 00007f730a202300 R15: 0000000000022000 [ 240.073484][T14215] FAULT_INJECTION: forcing a failure. [ 240.073484][T14215] name failslab, interval 1, probability 0, space 0, times 0 [ 240.086220][T14215] CPU: 0 PID: 14215 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 240.094984][T14215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.105032][T14215] Call Trace: [ 240.108294][T14215] dump_stack+0x137/0x19d [ 240.112609][T14215] should_fail+0x23c/0x250 [ 240.117006][T14215] __should_failslab+0x81/0x90 [ 240.121751][T14215] ? do_seccomp+0x56d/0x1530 [ 240.126319][T14215] should_failslab+0x5/0x20 [ 240.130880][T14215] kmem_cache_alloc_trace+0x49/0x310 [ 240.136199][T14215] do_seccomp+0x56d/0x1530 [ 240.140635][T14215] ? __cond_resched+0x11/0x40 [ 240.145315][T14215] ? fput+0x2d/0x130 [ 240.149202][T14215] ? ksys_write+0x157/0x180 [ 240.153686][T14215] __x64_sys_seccomp+0x3c/0x50 [ 240.158425][T14215] do_syscall_64+0x4a/0x90 [ 240.162820][T14215] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 240.168918][T14215] RIP: 0033:0x4665d9 [ 240.172802][T14215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.192414][T14215] RSP: 002b:00007ff36b600188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 240.201040][T14215] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 240.209085][T14215] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 10:52:13 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x19a3, 0x1c0}]) 10:52:13 executing program 0 (fault-call:0 fault-nth:1): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) [ 240.217287][T14215] RBP: 00007ff36b6001d0 R08: 0000000000000000 R09: 0000000000000000 [ 240.225402][T14215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.233366][T14215] R13: 00007fffa4b407cf R14: 00007ff36b600300 R15: 0000000000022000 [ 240.283599][T14224] FAULT_INJECTION: forcing a failure. [ 240.283599][T14224] name failslab, interval 1, probability 0, space 0, times 0 [ 240.296345][T14224] CPU: 0 PID: 14224 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 240.305103][T14224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.315143][T14224] Call Trace: [ 240.318415][T14224] dump_stack+0x137/0x19d [ 240.322753][T14224] should_fail+0x23c/0x250 [ 240.327213][T14224] __should_failslab+0x81/0x90 [ 240.331982][T14224] ? do_seccomp+0x56d/0x1530 [ 240.336621][T14224] should_failslab+0x5/0x20 [ 240.341115][T14224] kmem_cache_alloc_trace+0x49/0x310 [ 240.346390][T14224] do_seccomp+0x56d/0x1530 [ 240.350848][T14224] ? __cond_resched+0x11/0x40 [ 240.355524][T14224] ? fput+0x2d/0x130 [ 240.359406][T14224] ? ksys_write+0x157/0x180 [ 240.363954][T14224] __x64_sys_seccomp+0x3c/0x50 [ 240.368704][T14224] do_syscall_64+0x4a/0x90 [ 240.373164][T14224] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 240.379095][T14224] RIP: 0033:0x4665d9 [ 240.382979][T14224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.402706][T14224] RSP: 002b:00007f730a202188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 240.411118][T14224] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 240.419725][T14224] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 10:52:13 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x2000, 0x1c0}]) 10:52:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x5}, {0x6}]}) 10:52:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r2, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) [ 240.427688][T14224] RBP: 00007f730a2021d0 R08: 0000000000000000 R09: 0000000000000000 [ 240.435649][T14224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.443610][T14224] R13: 00007ffccd22d2ff R14: 00007f730a202300 R15: 0000000000022000 10:52:13 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x2500, 0x1c0}]) 10:52:13 executing program 4 (fault-call:0 fault-nth:2): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 240.507394][T14235] FAULT_INJECTION: forcing a failure. [ 240.507394][T14235] name failslab, interval 1, probability 0, space 0, times 0 [ 240.520035][T14235] CPU: 0 PID: 14235 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 240.528799][T14235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.538851][T14235] Call Trace: [ 240.542122][T14235] dump_stack+0x137/0x19d [ 240.546445][T14235] should_fail+0x23c/0x250 [ 240.550855][T14235] __should_failslab+0x81/0x90 [ 240.555625][T14235] should_failslab+0x5/0x20 [ 240.560128][T14235] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 240.565858][T14235] ? try_charge+0x36/0x9c0 [ 240.570266][T14235] ? __get_vm_area_node+0x11b/0x260 [ 240.575506][T14235] __get_vm_area_node+0x11b/0x260 [ 240.580540][T14235] __vmalloc_node_range+0xc2/0x5b0 [ 240.585654][T14235] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 240.591215][T14235] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 240.596768][T14235] __vmalloc+0x5a/0x70 [ 240.600907][T14235] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 240.606452][T14235] bpf_prog_alloc_no_stats+0x33/0x1f0 [ 240.611817][T14235] bpf_prog_alloc+0x16/0xe0 [ 240.616394][T14235] bpf_prog_create_from_user+0x6f/0x240 [ 240.622016][T14235] ? seccomp_run_filters+0x2b0/0x2b0 [ 240.627285][T14235] do_seccomp+0x5b1/0x1530 [ 240.631704][T14235] ? __cond_resched+0x11/0x40 [ 240.636374][T14235] ? fput+0x2d/0x130 [ 240.640261][T14235] ? ksys_write+0x157/0x180 [ 240.645005][T14235] __x64_sys_seccomp+0x3c/0x50 [ 240.649812][T14235] do_syscall_64+0x4a/0x90 [ 240.654255][T14235] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 240.660150][T14235] RIP: 0033:0x4665d9 [ 240.664036][T14235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.683665][T14235] RSP: 002b:00007ff36b600188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 240.692098][T14235] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 240.700065][T14235] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 240.708027][T14235] RBP: 00007ff36b6001d0 R08: 0000000000000000 R09: 0000000000000000 [ 240.716025][T14235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.724157][T14235] R13: 00007fffa4b407cf R14: 00007ff36b600300 R15: 0000000000022000 [ 240.732190][T14235] warn_alloc: 2 callbacks suppressed [ 240.732199][T14235] syz-executor.4: vmalloc size 4096 allocation failure: vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 240.754541][T14235] CPU: 0 PID: 14235 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 240.763314][T14235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.773367][T14235] Call Trace: [ 240.776726][T14235] dump_stack+0x137/0x19d [ 240.781067][T14235] warn_alloc+0x105/0x160 [ 240.785629][T14235] __vmalloc_node_range+0x222/0x5b0 [ 240.790882][T14235] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 240.796496][T14235] __vmalloc+0x5a/0x70 [ 240.800565][T14235] ? bpf_prog_alloc_no_stats+0x33/0x1f0 10:52:13 executing program 0 (fault-call:0 fault-nth:2): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x6}, {0x6}]}) 10:52:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fchmod(r0, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r2, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) [ 240.806286][T14235] bpf_prog_alloc_no_stats+0x33/0x1f0 [ 240.811661][T14235] bpf_prog_alloc+0x16/0xe0 [ 240.816173][T14235] bpf_prog_create_from_user+0x6f/0x240 [ 240.821725][T14235] ? seccomp_run_filters+0x2b0/0x2b0 [ 240.827007][T14235] do_seccomp+0x5b1/0x1530 [ 240.831417][T14235] ? __cond_resched+0x11/0x40 [ 240.836143][T14235] ? fput+0x2d/0x130 [ 240.840060][T14235] ? ksys_write+0x157/0x180 [ 240.844630][T14235] __x64_sys_seccomp+0x3c/0x50 [ 240.849389][T14235] do_syscall_64+0x4a/0x90 10:52:13 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x3f00, 0x1c0}]) [ 240.853796][T14235] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 240.859849][T14235] RIP: 0033:0x4665d9 [ 240.863749][T14235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.883353][T14235] RSP: 002b:00007ff36b600188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 240.891775][T14235] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 240.899917][T14235] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 240.907878][T14235] RBP: 00007ff36b6001d0 R08: 0000000000000000 R09: 0000000000000000 [ 240.915867][T14235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.923837][T14235] R13: 00007fffa4b407cf R14: 00007ff36b600300 R15: 0000000000022000 [ 240.931850][T14235] Mem-Info: [ 240.935145][T14235] active_anon:61 inactive_anon:67594 isolated_anon:0 [ 240.935145][T14235] active_file:5420 inactive_file:38283 isolated_file:0 [ 240.935145][T14235] unevictable:0 dirty:3905 writeback:0 [ 240.935145][T14235] slab_reclaimable:3916 slab_unreclaimable:5887 [ 240.935145][T14235] mapped:60491 shmem:2609 pagetables:2026 bounce:0 [ 240.935145][T14235] free:1844389 free_pcp:369 free_cma:0 [ 240.972003][T14235] Node 0 active_anon:244kB inactive_anon:270376kB active_file:21680kB inactive_file:154640kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241964kB dirty:15968kB writeback:0kB shmem:10436kB writeback_tmp:0kB kernel_stack:2368kB pagetables:8104kB all_unreclaimable? no [ 240.998780][T14235] Node 0 DMA free:15360kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 241.024951][T14235] lowmem_reserve[]: 0 2938 7916 7916 [ 241.030280][T14235] Node 0 DMA32 free:3013472kB min:4220kB low:7228kB high:10236kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:3013524kB mlocked:0kB bounce:0kB free_pcp:52kB local_pcp:52kB free_cma:0kB [ 241.057684][T14235] lowmem_reserve[]: 0 0 4978 4978 [ 241.062791][T14235] Node 0 Normal free:4343684kB min:7152kB low:12248kB high:17344kB reserved_highatomic:0KB active_anon:244kB inactive_anon:270376kB active_file:21680kB inactive_file:158120kB unevictable:0kB writepending:16840kB present:5242880kB managed:5098252kB mlocked:0kB bounce:0kB free_pcp:1460kB local_pcp:780kB free_cma:0kB [ 241.092414][T14235] lowmem_reserve[]: 0 0 0 0 [ 241.096966][T14235] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 241.109583][T14235] Node 0 DMA32: 4*4kB (M) 2*8kB (M) 4*16kB (M) 4*32kB (M) 6*64kB (M) 4*128kB (M) 5*256kB (M) 5*512kB (M) 4*1024kB (M) 1*2048kB (M) 733*4096kB (M) = 3013472kB [ 241.125518][T14235] Node 0 Normal: 287*4kB (UM) 157*8kB (UME) 217*16kB (UME) 178*32kB (UME) 88*64kB (UME) 47*128kB (UM) 32*256kB (UM) 22*512kB (UM) 5*1024kB (UM) 4*2048kB (UM) 1050*4096kB (UME) = 4356788kB [ 241.144179][T14235] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 241.153485][T14235] 19593 total pagecache pages 10:52:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x7c9800, 0x100) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000004c0)=ANY=[], 0x208e24b) kcmp(0xffffffffffffffff, r2, 0x0, r3, r0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x100) 10:52:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x7}, {0x6}]}) [ 241.158218][T14235] 0 pages in swap cache [ 241.162352][T14235] Swap cache stats: add 0, delete 0, find 0/0 [ 241.168600][T14235] Free swap = 0kB [ 241.172329][T14235] Total swap = 0kB [ 241.176147][T14235] 2097051 pages RAM [ 241.179937][T14235] 0 pages HighMem/MovableOnly [ 241.184623][T14235] 65267 pages reserved [ 241.202075][T14253] FAULT_INJECTION: forcing a failure. [ 241.202075][T14253] name failslab, interval 1, probability 0, space 0, times 0 [ 241.214700][T14253] CPU: 0 PID: 14253 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 241.223577][T14253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.233714][T14253] Call Trace: [ 241.237184][T14253] dump_stack+0x137/0x19d [ 241.241511][T14253] should_fail+0x23c/0x250 [ 241.245939][T14253] __should_failslab+0x81/0x90 [ 241.250776][T14253] should_failslab+0x5/0x20 [ 241.255276][T14253] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 241.261072][T14253] ? try_charge+0x36/0x9c0 [ 241.265669][T14253] ? __get_vm_area_node+0x11b/0x260 [ 241.270861][T14253] __get_vm_area_node+0x11b/0x260 [ 241.275912][T14253] __vmalloc_node_range+0xc2/0x5b0 [ 241.281090][T14253] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 241.286697][T14253] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 241.292284][T14253] __vmalloc+0x5a/0x70 [ 241.296418][T14253] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 241.301969][T14253] bpf_prog_alloc_no_stats+0x33/0x1f0 10:52:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) [ 241.307340][T14253] bpf_prog_alloc+0x16/0xe0 [ 241.311887][T14253] bpf_prog_create_from_user+0x6f/0x240 [ 241.317439][T14253] ? seccomp_run_filters+0x2b0/0x2b0 [ 241.322724][T14253] do_seccomp+0x5b1/0x1530 [ 241.327199][T14253] ? __cond_resched+0x11/0x40 [ 241.331968][T14253] ? fput+0x2d/0x130 [ 241.335870][T14253] ? ksys_write+0x157/0x180 [ 241.340388][T14253] __x64_sys_seccomp+0x3c/0x50 [ 241.345382][T14253] do_syscall_64+0x4a/0x90 [ 241.349796][T14253] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 241.355845][T14253] RIP: 0033:0x4665d9 [ 241.359812][T14253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 241.379416][T14253] RSP: 002b:00007f730a202188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 241.387830][T14253] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 241.395795][T14253] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 10:52:14 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x4000, 0x1c0}]) [ 241.403772][T14253] RBP: 00007f730a2021d0 R08: 0000000000000000 R09: 0000000000000000 [ 241.411741][T14253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 241.419713][T14253] R13: 00007ffccd22d2ff R14: 00007f730a202300 R15: 0000000000022000 10:52:14 executing program 0 (fault-call:0 fault-nth:3): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) [ 241.500111][T14274] FAULT_INJECTION: forcing a failure. [ 241.500111][T14274] name failslab, interval 1, probability 0, space 0, times 0 [ 241.512783][T14274] CPU: 1 PID: 14274 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 241.521541][T14274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.531589][T14274] Call Trace: [ 241.534944][T14274] dump_stack+0x137/0x19d [ 241.539276][T14274] should_fail+0x23c/0x250 [ 241.543687][T14274] __should_failslab+0x81/0x90 [ 241.548447][T14274] should_failslab+0x5/0x20 [ 241.552964][T14274] kmem_cache_alloc_node+0x58/0x2b0 [ 241.558172][T14274] ? alloc_vmap_area+0x12f/0x1340 [ 241.563202][T14274] alloc_vmap_area+0x12f/0x1340 [ 241.568054][T14274] ? kmem_cache_alloc_node_trace+0x1f6/0x2e0 [ 241.574076][T14274] __get_vm_area_node+0x165/0x260 [ 241.579091][T14274] __vmalloc_node_range+0xc2/0x5b0 [ 241.584200][T14274] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 241.589874][T14274] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 241.595456][T14274] __vmalloc+0x5a/0x70 [ 241.599513][T14274] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 241.605048][T14274] bpf_prog_alloc_no_stats+0x33/0x1f0 [ 241.610547][T14274] bpf_prog_alloc+0x16/0xe0 [ 241.615042][T14274] bpf_prog_create_from_user+0x6f/0x240 [ 241.620672][T14274] ? seccomp_run_filters+0x2b0/0x2b0 [ 241.625977][T14274] do_seccomp+0x5b1/0x1530 [ 241.630441][T14274] ? __cond_resched+0x11/0x40 [ 241.635117][T14274] ? fput+0x2d/0x130 [ 241.639084][T14274] ? ksys_write+0x157/0x180 [ 241.643591][T14274] __x64_sys_seccomp+0x3c/0x50 [ 241.648360][T14274] do_syscall_64+0x4a/0x90 [ 241.652834][T14274] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 241.658812][T14274] RIP: 0033:0x4665d9 [ 241.662692][T14274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 241.682298][T14274] RSP: 002b:00007f730a202188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 241.690770][T14274] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 10:52:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x8}, {0x6}]}) 10:52:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:14 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x4800, 0x1c0}]) [ 241.698725][T14274] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 241.706706][T14274] RBP: 00007f730a2021d0 R08: 0000000000000000 R09: 0000000000000000 [ 241.714694][T14274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 241.722731][T14274] R13: 00007ffccd22d2ff R14: 00007f730a202300 R15: 0000000000022000 10:52:14 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x4c00, 0x1c0}]) 10:52:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x9}, {0x6}]}) 10:52:14 executing program 0 (fault-call:0 fault-nth:4): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xff) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) openat(r4, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:14 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x5500, 0x1c0}]) 10:52:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0xc}, {0x6}]}) [ 241.916347][T14308] FAULT_INJECTION: forcing a failure. [ 241.916347][T14308] name failslab, interval 1, probability 0, space 0, times 0 [ 241.929087][T14308] CPU: 0 PID: 14308 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 241.937892][T14308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.947954][T14308] Call Trace: [ 241.951272][T14308] dump_stack+0x137/0x19d [ 241.955644][T14308] should_fail+0x23c/0x250 [ 241.960061][T14308] __should_failslab+0x81/0x90 [ 241.964824][T14308] should_failslab+0x5/0x20 [ 241.969315][T14308] kmem_cache_alloc_node+0x58/0x2b0 [ 241.974571][T14308] ? alloc_vmap_area+0x202/0x1340 [ 241.979655][T14308] alloc_vmap_area+0x202/0x1340 [ 241.984512][T14308] ? kmem_cache_alloc_node_trace+0x1f6/0x2e0 [ 241.990483][T14308] __get_vm_area_node+0x165/0x260 [ 241.995558][T14308] __vmalloc_node_range+0xc2/0x5b0 [ 242.000663][T14308] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 242.006363][T14308] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 242.011980][T14308] __vmalloc+0x5a/0x70 10:52:14 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x6800, 0x1c0}]) 10:52:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x10}, {0x6}]}) 10:52:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) [ 242.016046][T14308] ? bpf_prog_alloc_no_stats+0x33/0x1f0 [ 242.021622][T14308] bpf_prog_alloc_no_stats+0x33/0x1f0 [ 242.026985][T14308] bpf_prog_alloc+0x16/0xe0 [ 242.031483][T14308] bpf_prog_create_from_user+0x6f/0x240 [ 242.037089][T14308] ? seccomp_run_filters+0x2b0/0x2b0 [ 242.042364][T14308] do_seccomp+0x5b1/0x1530 [ 242.046850][T14308] ? __cond_resched+0x11/0x40 [ 242.051545][T14308] ? fput+0x2d/0x130 [ 242.055503][T14308] ? ksys_write+0x157/0x180 [ 242.060002][T14308] __x64_sys_seccomp+0x3c/0x50 10:52:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) [ 242.064828][T14308] do_syscall_64+0x4a/0x90 [ 242.069255][T14308] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 242.075226][T14308] RIP: 0033:0x4665d9 [ 242.079190][T14308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 242.098798][T14308] RSP: 002b:00007f730a202188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 242.107205][T14308] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 10:52:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 242.115173][T14308] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 242.123145][T14308] RBP: 00007f730a2021d0 R08: 0000000000000000 R09: 0000000000000000 [ 242.131192][T14308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 242.139156][T14308] R13: 00007ffccd22d2ff R14: 00007f730a202300 R15: 0000000000022000 10:52:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x202042, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r3, 0xca289435, &(0x7f00000002c0)={0x2, 0x0, @status={[0x5, 0x10000, 0x5, 0x12, 0x9, 0x2]}, [0x6, 0xbd7, 0x8, 0xf95a, 0x81, 0xff, 0x81, 0x4, 0x4, 0x9, 0x14, 0x9f, 0x81, 0x7fffffff, 0x3, 0x6, 0x0, 0x6, 0x602d, 0x149e0000000000, 0x3, 0x3, 0x2, 0xff, 0x6d, 0x8, 0x7f, 0x8fc2, 0x86, 0x4a9, 0x4, 0x8, 0x8, 0x100000001, 0x8, 0x1, 0x7, 0x5, 0x2, 0x800, 0x0, 0x460, 0x7, 0x1, 0x6, 0x6, 0x1, 0xcc, 0x7fffffff, 0x7fff, 0x2, 0x4, 0x4, 0x6, 0x1, 0xf6, 0x6, 0x9, 0x80000000, 0x7, 0x8001, 0x48d, 0x8, 0x3]}) 10:52:15 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x6c00, 0x1c0}]) [ 242.171625][ T25] kauditd_printk_skb: 19 callbacks suppressed [ 242.171635][ T25] audit: type=1326 audit(1624359134.983:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14299 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=0 compat=0 ip=0x41935c code=0x0 10:52:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) read(r1, &(0x7f0000000000)=""/150, 0x96) r3 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000240)) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x14}, {0x6}]}) 10:52:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:15 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x7400, 0x1c0}]) 10:52:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f0000000000)={0x8, 'wlan1\x00', {'ip6tnl0\x00'}, 0x6}) openat(0xffffffffffffff9c, 0x0, 0x400080, 0x209) r3 = accept$unix(r1, 0x0, &(0x7f0000000300)) write$binfmt_elf64(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f00000004c0)=ANY=[], 0x208e24b) sendmmsg(r4, &(0x7f0000001bc0)=[{{&(0x7f0000000340)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80, &(0x7f0000000540)=[{&(0x7f00000003c0)="870e18fcf6c8056634357d1e", 0xc}, {&(0x7f0000000400)="c4454399834c5070cc4f21aa3c434982626b5972ccc3c26df2af178a058dc46be547814b4bf817467aa3756f4a02cd27821c6afd5e4ae9b66d12e337ff9c2fddb9b9c834aa1f9f5dfcdb3275def87e6fbed614f9f7c4087bf499ceebe84fec81359bc6acc615a747c0c492baae3fb330c1ec03efc9c3a7ae8a3497b558e4b12601e986745922b1c81af19754b7986b289065da607875403a22a167dbdc96abc29981133ad8f92b0eee5bd00532cca069da769a7f6328f6b1922f382613ec05fced53aa4779d2749f5a95c78e3c38f767ab688c0d82f95d07", 0xd8}, {&(0x7f0000000500)="c8925aadc6fa68a2e5390e35", 0xc}], 0x3, &(0x7f0000000580)=[{0x30, 0x109, 0x4, "38443d47811db21fb5e835a3ba5676bd9765b5410abf2a8be4ab10"}, {0x58, 0x116, 0x10000, "a900c79e5b5c59d65dfa56cd9c8e89f27e65d7f34d1ad67ce26ac11c5a5f2648df70c4885e12d10215feb49af6383d96b8036a4294162c84b232bd5d8dae51c67959d2"}, {0xe0, 0x115, 0x7, "71a274a917816466c25a99fa08958ae0c55ee4022b6fc68eaf4c5bb2326a0095eb5fc64e9f4cba4da924e2a3181bab279575e9b46c4607bf8d2b98c27d5bed6fe4f042580f563431aae568db394589b53c7236c8896ce00c0140c5c7e0b81c54454edf845bf3595a0fcfdb3db517de1549261442028a2215a9d1ade021626c802d3b73c411df6429d16eff395b80f5f55aa733d2a19c8f9d5c6061eb23e2094e9eaa1535d23648df83d540f045cdbdab8d980f17633e125685b833c6f69bc0203398fe00791ff188e503b888392d"}, {0x38, 0x14, 0x7, "85d272ddbbf6fccb7f94e520eaff0bc7b9012a6ebbb441cc4207d959c508fe822d2adccffb"}], 0x1a0}}, {{&(0x7f0000000740)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @rand_addr=0x64010100}, 0x3, 0x2, 0x2, 0x3}}, 0x80, &(0x7f0000001b40)=[{&(0x7f00000007c0)="79a702c7eac8adeab5c596a1258f8786d6e208b2dc2ba8fbd86acd70922ef1e18d497ace2ce4073d9ca1f804308e8b8866a789dd0438680c1a5b449643355f67e0f806e07acbda6eb3b27a83312656629d8f229417505abca2fdabe4a8d733878ee4512bac669e41066913f7dfc4141a949b7ed7d02922d83336332d1dbac3ba6d174054274c505aa5bebe12c6b5bf53a3f97a4060915b26e6ecf087e9f2966ee23bd931d7d5be2ed3ef425d15a4571d6d07f025fd70de31", 0xb8}, {&(0x7f0000000880)="5cde8265c109c4c155f99f60517b1ab3e608ea302cbe46ec2078fcca5bfeb1c01dd193bef492596b700792522a2a08212a270fa60f7b3a2bcb1a3df38d57a91bad2f486e971159ab3d86992f2d6340a08b248b491f4627f9c941449bb2c5cfec310559ed765448847d5bf4ac0c619ac4666a9bc47bc152a75fd15853cecb4ced53b762f98b1e52064f2ba485225ac37f26395c500a8e756df095e611e12d41dd1246af8143d2827f64ed26a68fee4ce313c0e21dbc3dca5687f336d27e4d07aad8bfc07c316edaea5d5b2b1d7b3242050f6bd3d1a1cfb63d559729d7726f4f906cf3e7182bd4d035ed04", 0xea}, {&(0x7f0000000980)="50b75af0c045728c633de20c0378714dcc304fa3483887616c0bb1065ad0a72711f10f2b4c2450226c965dd06d5cdd73a700d3e7acff86f04cf2deea21f21bbce4e3b579a50ac1b7dda9724279e8df426ae4018d3d07352ce2ed18e6c1170972223cca05ac3a1028993cc866f2c76671343d9a6694230d774a23f7f5ccffe7f01a0c43859a2d4fb857d2d0b1f792d099570fdf6a4c5dbb9f80458d758dd551eb177665370db37d1af9c5209d141573af976135d8b3fb14cab2913c58b843d1", 0xbf}, {&(0x7f0000000a40)="e202a2cd355826da345c8f95217ff9bbbd7542b1c4ab06b899836bfa736f20460cda674a49e3d8f7b7ee96c33837d676d84844ca3ab199d697b82171978a25ead2c192494ab6baf6644c3e5f2e12bdfb9c03c7f4cc0170b4688f72a1b978b7df272f675d521bfceae2812f7da8da5d441f2ce50fdebd3aadeb841cbdb783326613999c6c5229eac6323f7b7c1801a8d56a9e6b3b79a4f2b6da49173816b231ac4117319525a234d3121656a04877ac0d99a88812fb19ed5a91c1065218e18ce823a350", 0xc3}, {&(0x7f0000000b40)="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", 0x1000}], 0x5}}], 0x2, 0x4000041) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r6, r5, 0x0, 0x100000002) r7 = dup2(r2, r6) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) clone(0x10200, &(0x7f0000000040)="b0a5ad", &(0x7f0000000080), &(0x7f0000000240), &(0x7f00000002c0)="f7bace1e5fe80f2a71a8965626f1a9b10e025268449f4e77") ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000002780)={0x2, 0x7, 0x4, 0x0, 0x0, [{{}, 0x401}, {{r7}, 0x1}, {{}, 0x3ff}, {{}, 0xffffffff}]}) 10:52:15 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(0xffffffffffffffff, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:15 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x7a00, 0x1c0}]) [ 242.781390][ T25] audit: type=1326 audit(1624359135.593:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14346 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x7, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:15 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(0xffffffffffffffff, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x15}, {0x6}]}) 10:52:15 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x9000, 0x1c0}]) 10:52:15 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(0xffffffffffffffff, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) [ 242.895708][ T25] audit: type=1326 audit(1624359135.633:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14351 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xe, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:15 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xa319, 0x1c0}]) [ 242.995890][ T25] audit: type=1326 audit(1624359135.763:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14373 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x14, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x16}, {0x6}]}) 10:52:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xfeff, 0x1c0}]) 10:52:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x7, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2dc00, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xff0f, 0x1c0}]) [ 243.570674][ T25] audit: type=1326 audit(1624359136.383:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14398 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1f00a8, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xfffe, 0x1c0}]) 10:52:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1c}, {0x6}]}) 10:52:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xe, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x20000, 0x1c0}]) 10:52:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000000000, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) [ 243.725899][ T25] audit: type=1326 audit(1624359136.543:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14425 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x14, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x80000, 0x1c0}]) 10:52:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x1d}, {0x6}]}) 10:52:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000002340)={0x0, "8d64cf2e71ffe98d8c02dec745f37cd4"}) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000003340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, r7, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r8]}, @devid}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000018c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') sendmsg$NLBL_CIPSOV4_C_REMOVE(r10, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r9, @ANYRES32=r8, @ANYRESOCT, @ANYRES32=r6, @ANYRES32, @ANYRES64, @ANYRESHEX=r5], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000003540)={0x4, 0x4, {0xfffffffffffffffd, @struct={0x9c, 0x9e1e}, r4, 0x18, 0x7, 0x0, 0x1, 0x3, 0x0, @usage=0x200, 0x3, 0x1, [0x9, 0x1c, 0xfffffffffffffff9, 0x2, 0x7, 0xfffffffffffffffa]}, {0x8, @usage=0x2, r9, 0x7fff, 0x800, 0xac2a, 0xffffffffffffffff, 0x4987, 0x0, @struct={0xff, 0x401}, 0x8, 0xff, [0x10000000072db, 0x1ff, 0x2, 0x4, 0x3f, 0x401]}, {0xe78, @struct={0x9, 0x2}, 0x0, 0x7ff, 0xbd, 0x6, 0x80000000, 0x40, 0x404, @usage=0x10000, 0xd6a, 0xffff, [0x6, 0x6, 0xc2, 0x3, 0x7, 0x6]}, {0x7ff, 0x2, 0x5}}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f00000006c0)={0x10, 0x6, {0x36, @usage=0x6, 0x0, 0x1, 0x4, 0x3, 0x7f, 0x8, 0x40, @struct={0x3, 0x7}, 0x710, 0x200, [0x101, 0x8, 0x2, 0x800, 0x7fff, 0xfffffffffffff801]}, {0x0, @struct={0x8, 0x80}, 0x0, 0x6, 0x100, 0x6, 0x6, 0x101, 0x41, @usage=0x40, 0x8, 0x9, [0x5, 0x4, 0xfffffffffffffff7, 0x9, 0x4, 0x3]}, {0xc6, @usage=0x5, r9, 0x3, 0x80000000, 0xf5, 0x4, 0x5, 0x80, @struct={0x0, 0x16cc}, 0x1, 0x9, [0x101, 0x2d9f, 0x1, 0x8, 0x3, 0x2]}, {0x8, 0x8, 0x5}}) 10:52:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2dc00, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) [ 243.850382][ T25] audit: type=1326 audit(1624359136.663:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14447 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x80040, 0x1c0}]) 10:52:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x900000, 0x1c0}]) 10:52:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1f00a8, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[], 0x208e24b) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000), 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat(r3, 0x0, 0x4000, 0xb) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x6628, 0x0) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xfdef}], 0x1, 0x0, 0x0) 10:52:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x21}, {0x6}]}) [ 243.889815][ T25] audit: type=1326 audit(1624359136.703:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14448 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 243.927591][T14456] device lo entered promiscuous mode 10:52:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x1000000, 0x1c0}]) 10:52:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000000000, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x24}, {0x6}]}) 10:52:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) fchmod(r0, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x2000000, 0x1c0}]) [ 244.060281][ T25] audit: type=1326 audit(1624359136.873:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:52:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) [ 244.105061][ T25] audit: type=1326 audit(1624359136.913:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4193eb code=0x0 10:52:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x2040000, 0x1c0}]) 10:52:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x3000000, 0x1c0}]) 10:52:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(0xffffffffffffffff, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x25}, {0x6}]}) 10:52:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x4000000, 0x1c0}]) 10:52:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x28}, {0x6}]}) 10:52:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x5000000, 0x1c0}]) 10:52:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x6000000, 0x1c0}]) 10:52:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x2c}, {0x6}]}) 10:52:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(0xffffffffffffffff, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x6040000, 0x1c0}]) 10:52:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x2d}, {0x6}]}) 10:52:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x7000000, 0x1c0}]) 10:52:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x8000000, 0x1c0}]) 10:52:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x30}, {0x6}]}) 10:52:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x9000000, 0x1c0}]) 10:52:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x34}, {0x6}]}) 10:52:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(0xffffffffffffffff, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xa000000, 0x1c0}]) 10:52:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x35}, {0x6}]}) 10:52:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xb000000, 0x1c0}]) 10:52:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xc000000, 0x1c0}]) 10:52:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xd000000, 0x1c0}]) 10:52:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x3c}, {0x6}]}) 10:52:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xd, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xe000000, 0x1c0}]) 10:52:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xd, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x10, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x3d}, {0x6}]}) 10:52:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x10, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0xf000000, 0x1c0}]) 10:52:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x10000000, 0x1c0}]) 10:52:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x44}, {0x6}]}) 10:52:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x11000000, 0x1c0}]) 10:52:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x12000000, 0x1c0}]) 10:52:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x15, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x45}, {0x6}]}) 10:52:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x15, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x20000000, 0x1c0}]) 10:52:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x25000000, 0x1c0}]) 10:52:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x48}, {0x6}]}) 10:52:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x3f000000, 0x1c0}]) 10:52:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x4c}, {0x6}]}) 10:52:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x40000000, 0x1c0}]) 10:52:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1c, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1c, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x4d}, {0x6}]}) 10:52:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x40000800, 0x1c0}]) 10:52:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x44db9dd7, 0x1c0}]) 10:52:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x50}, {0x6}]}) 10:52:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x48000000, 0x1c0}]) 10:52:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x54}, {0x6}]}) 10:52:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/184, 0xb8}], 0x1, 0xffffffff, 0x0) 10:52:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x21, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x21, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x4c000000, 0x1c0}]) 10:52:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {0x5c}, {0x6}]}) 10:52:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x24, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x55000000, 0x1c0}]) 10:52:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x24, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) 10:52:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x25, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2d, 0x0, 0x1}, {}, {0x6}]}) 10:52:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x55aaffff, 0x1c0}])