0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) [ 1378.184986][ T9439] loop4: detected capacity change from 264192 to 0 07:19:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x1f) sendfile(r3, r4, 0x0, 0x220fff) r5 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r5, 0x2008002) sendfile(r2, r5, 0x0, 0x220fff) [ 1378.265744][ T35] audit: type=1800 audit(1611904780.647:2815): pid=9439 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=34 res=0 errno=0 07:19:40 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:40 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 07:19:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x608000) [ 1378.485014][ T9451] loop4: detected capacity change from 264192 to 0 07:19:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:41 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) 07:19:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x608000) [ 1378.906756][ T9472] loop4: detected capacity change from 264192 to 0 07:19:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:41 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) 07:19:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x608000) 07:19:41 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) [ 1379.315447][ T9487] loop4: detected capacity change from 264192 to 0 07:19:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x1f) sendfile(r3, r4, 0x0, 0x220fff) r5 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r5, 0x2008002) sendfile(r2, r5, 0x0, 0x220fff) 07:19:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x608000) 07:19:42 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) 07:19:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:42 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 07:19:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x608000) [ 1379.762249][ T9512] loop4: detected capacity change from 264192 to 0 07:19:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x608000) 07:19:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:42 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) 07:19:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, r1, 0x0, 0x1}, 0x40) [ 1380.219765][ T9532] loop4: detected capacity change from 264192 to 0 07:19:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x1f) sendfile(r3, r4, 0x0, 0x220fff) r5 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r5, 0x2008002) 07:19:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x608000) 07:19:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:42 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) 07:19:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:42 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 07:19:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x608000) [ 1380.647240][ T9556] loop4: detected capacity change from 264192 to 0 07:19:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x1f) sendfile(r3, r4, 0x0, 0x220fff) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) 07:19:43 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x27ffd) 07:19:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x608000) 07:19:43 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) [ 1381.242384][ T9576] loop4: detected capacity change from 264192 to 0 07:19:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x1f) sendfile(r3, r4, 0x0, 0x220fff) [ 1381.324377][ T35] kauditd_printk_skb: 12 callbacks suppressed [ 1381.324396][ T35] audit: type=1800 audit(1611904783.767:2828): pid=9576 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=39 res=0 errno=0 07:19:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x608000) 07:19:43 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x27ffd) 07:19:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) ftruncate(r1, 0x608000) [ 1381.545604][ T35] audit: type=1804 audit(1611904783.897:2829): pid=9584 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1266/cgroup.controllers" dev="sda1" ino=16380 res=1 errno=0 07:19:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x1f) sendfile(r3, r4, 0x0, 0x220fff) [ 1381.732125][ T35] audit: type=1804 audit(1611904783.997:2830): pid=9585 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1196/cgroup.controllers" dev="sda1" ino=16211 res=1 errno=0 [ 1381.784537][ T9600] loop4: detected capacity change from 264192 to 0 [ 1381.856687][ T35] audit: type=1800 audit(1611904784.307:2831): pid=9605 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=40 res=0 errno=0 07:19:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 07:19:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) ftruncate(r1, 0x608000) 07:19:44 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x27ffd) 07:19:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r3, r4, 0x0, 0x220fff) 07:19:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) ftruncate(r1, 0x608000) [ 1382.134829][ T35] audit: type=1804 audit(1611904784.587:2832): pid=9613 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1267/cgroup.controllers" dev="sda1" ino=16370 res=1 errno=0 07:19:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r3, r4, 0x0, 0x220fff) [ 1382.178636][ T9621] loop4: detected capacity change from 264192 to 0 07:19:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) ftruncate(0xffffffffffffffff, 0x608000) 07:19:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r3, r4, 0x0, 0x220fff) [ 1382.289773][ T35] audit: type=1804 audit(1611904784.687:2833): pid=9627 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1197/cgroup.controllers" dev="sda1" ino=16197 res=1 errno=0 07:19:44 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x0) 07:19:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 1382.627069][ T9645] loop4: detected capacity change from 264192 to 0 07:19:45 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="4604", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 07:19:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) ftruncate(0xffffffffffffffff, 0x608000) 07:19:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) ftruncate(0xffffffffffffffff, 0x1f) sendfile(r3, 0xffffffffffffffff, 0x0, 0x220fff) [ 1382.705981][ T35] audit: type=1800 audit(1611904785.157:2834): pid=9645 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=41 res=0 errno=0 07:19:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:45 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x0) 07:19:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) ftruncate(0xffffffffffffffff, 0x1f) sendfile(r3, 0xffffffffffffffff, 0x0, 0x220fff) 07:19:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:45 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x0) [ 1382.997751][ T9666] loop4: detected capacity change from 264192 to 0 [ 1383.012466][ T35] audit: type=1800 audit(1611904785.457:2835): pid=9666 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=42 res=0 errno=0 07:19:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) ftruncate(0xffffffffffffffff, 0x608000) 07:19:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17], 0x0, r1, 0x0, 0x1}, 0x40) [ 1383.128046][ T35] audit: type=1804 audit(1611904785.497:2836): pid=9664 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1268/cgroup.controllers" dev="sda1" ino=16151 res=1 errno=0 07:19:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) ftruncate(0xffffffffffffffff, 0x1f) sendfile(r3, 0xffffffffffffffff, 0x0, 0x220fff) [ 1383.193307][ T9677] loop4: detected capacity change from 264192 to 0 [ 1383.335061][ T35] audit: type=1804 audit(1611904785.507:2837): pid=9663 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1199/cgroup.controllers" dev="sda1" ino=16371 res=1 errno=0 07:19:46 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="4604", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 07:19:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x1f) sendfile(r3, r4, 0x0, 0x220fff) 07:19:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x0) 07:19:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={0x0, 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x1f) sendfile(r3, r4, 0x0, 0x220fff) 07:19:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x0) 07:19:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:46 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="4604", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 07:19:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x1f) sendfile(r3, r4, 0x0, 0x220fff) 07:19:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={0x0, 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ftruncate(r1, 0x0) 07:19:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:46 executing program 4: write$proc_mixer(0xffffffffffffffff, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) close(0xffffffffffffffff) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(0xffffffffffffffff, r3, 0x0, 0x220fff) 07:19:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='syzkaller\x00', 0x7, 0xaf, &(0x7f0000000080)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:19:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:47 executing program 4: write$proc_mixer(0xffffffffffffffff, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="460400", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 07:19:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) close(0xffffffffffffffff) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(0xffffffffffffffff, r3, 0x0, 0x220fff) 07:19:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={0x0, 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:47 executing program 4: write$proc_mixer(0xffffffffffffffff, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) close(0xffffffffffffffff) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(0xffffffffffffffff, r3, 0x0, 0x220fff) 07:19:47 executing program 4: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x1) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:47 executing program 4: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x1) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="460400", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 07:19:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:47 executing program 4: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x1) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:19:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:48 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x1) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:19:48 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x1) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:48 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="460400", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 07:19:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:19:48 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x1) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:48 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x0) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:48 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000002) 07:19:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:48 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x0) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x1f) sendfile(r0, r1, 0x0, 0x220fff) 07:19:49 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x0) write$proc_mixer(r0, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 1386.707225][ T35] kauditd_printk_skb: 10 callbacks suppressed [ 1386.707243][ T35] audit: type=1804 audit(1611904789.157:2848): pid=9866 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1274/cgroup.controllers" dev="sda1" ino=15795 res=1 errno=0 07:19:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:49 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000002) 07:19:49 executing program 4: syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(0xffffffffffffffff, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x1f) sendfile(r0, r1, 0x0, 0x220fff) [ 1386.934960][ T35] audit: type=1804 audit(1611904789.187:2849): pid=9867 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1205/cgroup.controllers" dev="sda1" ino=15748 res=1 errno=0 07:19:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x22, 0x2, 0x3) accept4$netrom(r0, 0x0, 0x0, 0x0) [ 1387.185771][ T35] audit: type=1804 audit(1611904789.637:2850): pid=9891 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1275/cgroup.controllers" dev="sda1" ino=15749 res=1 errno=0 07:19:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:49 executing program 4: syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(0xffffffffffffffff, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x1f) sendfile(r0, r1, 0x0, 0x220fff) 07:19:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x22, 0x2, 0x3) accept4$netrom(r0, 0x0, 0x0, 0x0) 07:19:49 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000002) 07:19:49 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:49 executing program 4: syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(0xffffffffffffffff, &(0x7f0000000380)=[{'OGAIN', @val={' \'', 'Line Capture', '\' '}}], 0x2a) 07:19:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x22, 0x2, 0x3) accept4$netrom(r0, 0x0, 0x0, 0x0) 07:19:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, r1, 0x0, 0x1}, 0x40) [ 1387.542470][ T35] audit: type=1804 audit(1611904789.987:2851): pid=9904 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1206/cgroup.controllers" dev="sda1" ino=16065 res=1 errno=0 07:19:50 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:50 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) [ 1387.701600][ T35] audit: type=1804 audit(1611904790.067:2852): pid=9905 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1276/cgroup.controllers" dev="sda1" ino=15749 res=1 errno=0 07:19:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r5], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000002) 07:19:50 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(r0, 0x0, 0x0) 07:19:50 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:50 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:50 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(r0, 0x0, 0x0) 07:19:50 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) [ 1388.146475][ T35] audit: type=1804 audit(1611904790.597:2853): pid=9933 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1207/cgroup.controllers" dev="sda1" ino=16114 res=1 errno=0 07:19:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:50 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) [ 1388.243544][ T35] audit: type=1804 audit(1611904790.647:2854): pid=9940 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1277/cgroup.controllers" dev="sda1" ino=16129 res=1 errno=0 07:19:50 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(r0, 0x0, 0x0) 07:19:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r5], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000002) 07:19:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:51 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:51 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(r0, &(0x7f0000000380), 0x0) [ 1388.600654][ T35] audit: type=1804 audit(1611904791.047:2855): pid=9954 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1278/cgroup.controllers" dev="sda1" ino=15795 res=1 errno=0 07:19:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r5], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000002) 07:19:51 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(r0, &(0x7f0000000380), 0x0) 07:19:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:51 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) [ 1388.849724][ T35] audit: type=1804 audit(1611904791.297:2856): pid=9967 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1208/cgroup.controllers" dev="sda1" ino=15750 res=1 errno=0 [ 1389.006252][ T35] audit: type=1804 audit(1611904791.457:2857): pid=9973 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1279/cgroup.controllers" dev="sda1" ino=15825 res=1 errno=0 07:19:51 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(r0, &(0x7f0000000380), 0x0) 07:19:51 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x0) 07:19:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) r3 = fanotify_init(0x0, 0x0) dup2(r2, r3) 07:19:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:52 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x0) 07:19:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:52 executing program 4: sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x0, 0x0, 0xfffffffa}, 0x0) 07:19:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:52 executing program 4: socketpair(0x1d, 0x0, 0xffff, &(0x7f0000000000)) 07:19:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:52 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff83edef671cca31eff4", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x0) 07:19:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:52 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x10, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:19:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:52 executing program 4: socketpair(0x28, 0x0, 0x0, &(0x7f0000000400)) 07:19:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x40046629, &(0x7f0000000280)) 07:19:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:53 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) close(r2) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000240)='key_or_keyring:', 0x0, &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', 0x0, &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:19:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:53 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1}, 0x0) 07:19:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:53 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) close(r2) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000240)='key_or_keyring:', 0x0, &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', 0x0, &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:19:53 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) mmap(&(0x7f0000fec000/0x12000)=nil, 0x12000, 0x0, 0x12, r0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) 07:19:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:54 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB='#!'], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) close(r0) execve(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f0000000880)='%\x00', &(0x7f0000000900)='asymmetric\x00']) 07:19:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1f) sendfile(r1, r2, 0x0, 0x220fff) 07:19:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x22, 0x2, 0x3) accept4$netrom(r1, 0x0, 0x0, 0x0) 07:19:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x22, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:54 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b931dd094c1aa5443d95d1312f014d336b04b030400000000000092290a7e4555a763c1bfe2a08de276ed3ae7a2885e36b884bbcb3f50490f114d83c36515f936e1318eed5a4211763c064750c928f9e04681cfdd5a9b8b775bdbd501133566300f11b45b594a3ccce73bfa1b8b859ff73ac845e77253df938636bcbdeeef274aa294b9999e95c8c8ec26b78932d57aae34f30d6ab83ccccc98c7f4be21faeb127f0300000000000000abfcdf08c7cb96e8c156416cfc1b23c88af0143a2526937921d2e34496a0ca4d71227b362a942c59f08cd8e4ba8a46a6f6340a85d96c168e5f1201fe3f97c1bd3b8f845813c55433aeb54e163ce3e3211375672d79a0bcf0fef5a28cd0782fe4187c958a8a154e03e5dff816eb001fab34d5904f346ba64441d98e9de99f6b3069664ab79a1024ce9fac129416b568648fe476870e27d734ed3fe05f15384d0942f0f723c3de390a7a53ce5a4f2640f43ac6145b9ed02503225ff603715d9ce89da15c89af6b83a4b2439dce75db38f8d7a3961efe9a7fb3f7cbe85d6acb0eb8a4619effbaf4aedf28ca98540a3b66b4bfe020afaff82343e7e8179f763f268d555658db62a00389084b3580c9f961ec21147aed1d0bb9"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) close(r2) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000240)='key_or_keyring:', 0x0, &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', 0x0, &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:19:54 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB='#!'], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) close(r0) execve(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f0000000880)='%\x00', &(0x7f0000000900)='asymmetric\x00']) 07:19:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16], 0x0, r1, 0x0, 0x1}, 0x40) [ 1392.146899][ T35] kauditd_printk_skb: 7 callbacks suppressed [ 1392.146916][ T35] audit: type=1804 audit(1611904794.597:2865): pid=10120 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1213/cgroup.controllers" dev="sda1" ino=16245 res=1 errno=0 07:19:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x22, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:55 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b931dd094c1aa5443d95d1312f014d336b04b030400000000000092290a7e4555a763c1bfe2a08de276ed3ae7a2885e36b884bbcb3f50490f114d83c36515f936e1318eed5a4211763c064750c928f9e04681cfdd5a9b8b775bdbd501133566300f11b45b594a3ccce73bfa1b8b859ff73ac845e77253df938636bcbdeeef274aa294b9999e95c8c8ec26b78932d57aae34f30d6ab83ccccc98c7f4be21faeb127f0300000000000000abfcdf08c7cb96e8c156416cfc1b23c88af0143a2526937921d2e34496a0ca4d71227b362a942c59f08cd8e4ba8a46a6f6340a85d96c168e5f1201fe3f97c1bd3b8f845813c55433aeb54e163ce3e3211375672d79a0bcf0fef5a28cd0782fe4187c958a8a154e03e5dff816eb001fab34d5904f346ba64441d98e9de99f6b3069664ab79a1024ce9fac129416b568648fe476870e27d734ed3fe05f15384d0942f0f723c3de390a7a53ce5a4f2640f43ac6145b9ed02503225ff603715d9ce89da15c89af6b83a4b2439dce75db38f8d7a3961efe9a7fb3f7cbe85d6acb0eb8a4619effbaf4aedf28ca98540a3b66b4bfe020afaff82343e7e8179f763f268d555658db62a00389084b3580c9f961ec21147aed1d0bb9"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) close(r2) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000240)='key_or_keyring:', 0x0, &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', 0x0, &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:19:55 executing program 0: socketpair(0x10, 0x2, 0x80000001, &(0x7f0000000000)) 07:19:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x22, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1392.812284][ T35] audit: type=1804 audit(1611904795.257:2866): pid=10156 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1214/cgroup.controllers" dev="sda1" ino=16256 res=1 errno=0 07:19:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:55 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={0x0, 0x989680}, &(0x7f0000000c00)={&(0x7f0000000bc0), 0x8}) 07:19:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:55 executing program 0: socketpair(0x23, 0x0, 0x0, &(0x7f0000000080)) 07:19:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01000000000000000001"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x2, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$isdn_base(0x22, 0x3, 0x0) close(r2) 07:19:55 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r0 = open(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)) io_submit(r1, 0xa, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, 0xffffffffffffffff, &(0x7f0000000040), 0xa0e}]) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e159c687a", 0x71, 0x400, 0x0, 0x1, r0}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x49, 0x0, 0x0, 0x0) 07:19:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b], 0x0, r1, 0x0, 0x1}, 0x40) [ 1393.410516][ T35] audit: type=1804 audit(1611904795.857:2867): pid=10193 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1215/cgroup.controllers" dev="sda1" ino=16253 res=1 errno=0 07:19:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x0, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:56 executing program 4: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xffffffffffffffff, 0x101142) 07:19:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01000000000000000001"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x0, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) [ 1393.846237][ T35] audit: type=1800 audit(1611904796.297:2868): pid=10218 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16248 res=0 errno=0 07:19:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:56 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:19:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:56 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x0) mmap$qrtrtun(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1f, 0x13, r0, 0x0) [ 1394.001835][ T35] audit: type=1804 audit(1611904796.447:2869): pid=10227 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1216/cgroup.controllers" dev="sda1" ino=16279 res=1 errno=0 07:19:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x0, 0x3) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e], 0x0, r1, 0x0, 0x1}, 0x40) [ 1394.175860][T10238] loop4: detected capacity change from 264192 to 0 [ 1394.270990][ T35] audit: type=1800 audit(1611904796.717:2870): pid=10238 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=43 res=0 errno=0 07:19:56 executing program 0: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500803103000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000d94b352a0a2f80c06d5709ffc2c654"}, 0x46) getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 07:19:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01000000000000000001"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:57 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:19:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(0x0, 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(0x0, 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) [ 1394.998114][ T35] audit: type=1804 audit(1611904797.447:2871): pid=10274 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1218/cgroup.controllers" dev="sda1" ino=16285 res=1 errno=0 [ 1395.049350][T10275] loop4: detected capacity change from 264192 to 0 [ 1395.221368][ T35] audit: type=1800 audit(1611904797.547:2872): pid=10285 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16248 res=0 errno=0 07:19:57 executing program 0: timer_create(0x4, &(0x7f0000000100)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 07:19:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0) 07:19:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(0x0, 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:57 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:19:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:58 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40081, 0x0) write$vga_arbiter(r0, 0x0, 0x0) [ 1395.527079][T10303] loop4: detected capacity change from 264192 to 0 07:19:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x22, 0x2, 0x3) accept4$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1395.654539][ T35] audit: type=1804 audit(1611904798.097:2873): pid=10301 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1219/cgroup.controllers" dev="sda1" ino=16287 res=1 errno=0 07:19:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) [ 1395.715802][ T35] audit: type=1800 audit(1611904798.157:2874): pid=10308 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16289 res=0 errno=0 07:19:58 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8937, &(0x7f0000001900)={'team0\x00'}) 07:19:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:58 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:19:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x22, 0x2, 0x3) accept4$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:19:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) [ 1396.109796][T10332] loop4: detected capacity change from 264192 to 0 07:19:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:58 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x4002, 0x0) 07:19:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(0xffffffffffffffff, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x22, 0x2, 0x3) accept4$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:19:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:59 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:19:59 executing program 0: io_uring_setup(0x1ff0, &(0x7f0000000800)={0x0, 0x0, 0x23}) 07:19:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(0xffffffffffffffff, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:59 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed={{0x5}}, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:19:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:19:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:59 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000b00), 0x0, &(0x7f0000000b80)={0x0, 0x989680}, 0x0) [ 1396.791027][T10363] loop4: detected capacity change from 264192 to 0 07:19:59 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x1}) 07:19:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(0xffffffffffffffff, 0x1f) sendfile(r2, r3, 0x0, 0x220fff) 07:19:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, r1, 0x0, 0x1}, 0x40) 07:19:59 executing program 0: pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000b40)={0x2}, &(0x7f0000000b80)={0x0, 0x989680}, 0x0) 07:19:59 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x1}) 07:20:00 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:20:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x0) sendfile(r2, r3, 0x0, 0x220fff) 07:20:00 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:00 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891d, &(0x7f0000001900)={'team0\x00'}) 07:20:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:00 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x1}) 07:20:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x19, 0x0, 0x0) 07:20:00 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x0) sendfile(r2, r3, 0x0, 0x220fff) [ 1397.887741][T10402] loop4: detected capacity change from 264192 to 0 [ 1397.911250][ T35] kauditd_printk_skb: 3 callbacks suppressed [ 1397.911267][ T35] audit: type=1800 audit(1611904800.357:2878): pid=10402 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=46 res=0 errno=0 07:20:00 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x5460, 0x0) 07:20:00 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x541b, 0x0) 07:20:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x0) sendfile(r2, r3, 0x0, 0x220fff) [ 1398.270460][ T35] audit: type=1804 audit(1611904800.717:2879): pid=10419 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1222/cgroup.controllers" dev="sda1" ino=16281 res=1 errno=0 07:20:00 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:20:00 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x1}) 07:20:00 executing program 0: r0 = syz_usb_connect(0x0, 0x51, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x6b, 0x93, 0x54, 0x10, 0xdf6, 0x21, 0x4c8d, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3f, 0x1, 0x0, 0x2, 0x20, 0x0, [{{0x9, 0x4, 0xcb, 0x0, 0x5, 0x5d, 0x7f, 0xe2, 0x0, [], [{{0x9, 0x5, 0x0, 0x1, 0x0, 0x1, 0x7, 0x3}}, {{0x9, 0x5, 0xf, 0x0, 0x10, 0x0, 0x3, 0x8}}, {}, {{0x9, 0x5, 0x0, 0x2, 0x0, 0x7f}}, {{0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x4, 0x9}}]}}]}}]}}, &(0x7f00000009c0)={0x0, 0x0, 0xf, &(0x7f0000000500)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa}]}, 0x4, [{0x2, &(0x7f0000000540)=@string={0x2}}, {0x0, 0x0}, {0x0, 0x0}, {0x2, &(0x7f00000006c0)=@string={0x2}}]}) syz_usb_control_io(r0, &(0x7f0000000d40)={0x2c, &(0x7f0000000a80)={0x0, 0x6, 0xd, {0xd, 0xa3ab1bce47b364cb, "f15b560658467036ff8f42"}}, &(0x7f0000000ac0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x459}}, 0x0, 0x0, &(0x7f0000000d00)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x0, 0x0, 0xff, 0x0, 0x1f, 0x7, 0xfff}}}, &(0x7f0000001240)={0x84, 0x0, &(0x7f0000000e80)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000ec0)={0x0, 0x8, 0x1, 0x3}, &(0x7f0000000f00)={0x20, 0x0, 0x4, {0x0, 0x3}}, 0x0, &(0x7f0000000f80)={0x40, 0x7, 0x2, 0x4}, 0x0, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x40, 0x17, 0x6, @remote}, 0x0, &(0x7f0000001140)={0x40, 0x1a, 0x2, 0x200}, &(0x7f0000001180)={0x40, 0x1c, 0x1}, &(0x7f00000011c0)={0x40, 0x1e, 0x1, 0x7f}, 0x0}) syz_usb_disconnect(r0) socket(0x12, 0x2, 0x0) 07:20:00 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(0xffffffffffffffff, r3, 0x0, 0x220fff) 07:20:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, r1, 0x0, 0x1}, 0x40) [ 1398.650888][T10437] loop4: detected capacity change from 264192 to 0 [ 1398.684076][ T35] audit: type=1800 audit(1611904801.127:2880): pid=10437 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=47 res=0 errno=0 [ 1398.846238][ T9751] usb 1-1: new high-speed USB device number 13 using dummy_hcd 07:20:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[], 0x30}}, 0x0) 07:20:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, r1, 0x0, 0x1}, 0x40) [ 1399.078906][ T35] audit: type=1804 audit(1611904801.527:2881): pid=10451 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1223/cgroup.controllers" dev="sda1" ino=16312 res=1 errno=0 [ 1399.115521][ T9751] usb 1-1: Using ep0 maxpacket: 16 07:20:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(0xffffffffffffffff, r3, 0x0, 0x220fff) 07:20:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1399.336017][ T9751] usb 1-1: config 0 has an invalid interface number: 203 but max is 0 [ 1399.358090][ T9751] usb 1-1: config 0 has no interface number 0 [ 1399.418965][ T9751] usb 1-1: config 0 interface 203 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1399.454901][ T9751] usb 1-1: config 0 interface 203 altsetting 0 has an invalid endpoint with address 0x0, skipping 07:20:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, r1, 0x0, 0x1}, 0x40) [ 1399.478189][ T9751] usb 1-1: config 0 interface 203 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1399.510891][ T9751] usb 1-1: config 0 interface 203 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 07:20:02 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(0xffffffffffffffff, r3, 0x0, 0x220fff) [ 1399.605107][ T9751] usb 1-1: language id specifier not provided by device, defaulting to English [ 1399.764033][T10473] loop4: detected capacity change from 264192 to 0 [ 1399.807500][ T35] audit: type=1800 audit(1611904802.257:2882): pid=10473 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=48 res=0 errno=0 [ 1400.166663][ T9751] usb 1-1: New USB device found, idVendor=0df6, idProduct=0021, bcdDevice=4c.8d [ 1400.189692][ T9751] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1400.219055][ T9751] usb 1-1: config 0 descriptor?? [ 1400.804979][ T9751] usb 1-1: Cannot read MAC address [ 1400.812297][ T9751] MOSCHIP usb-ethernet driver: probe of 1-1:0.203 failed with error -71 [ 1400.839678][ T9751] usb 1-1: USB disconnect, device number 13 [ 1401.744782][ T4894] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 1402.004765][ T4894] usb 1-1: Using ep0 maxpacket: 16 07:20:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x9, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1c, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:04 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, 0xffffffffffffffff, 0x0, 0x220fff) 07:20:04 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1402.263379][ T4894] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 1402.271745][T10503] loop4: detected capacity change from 264192 to 0 [ 1402.289213][ T4894] usb 1-1: can't read configurations, error -71 07:20:04 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], 0x0, r1, 0x0, 0x1}, 0x40) [ 1402.338223][ T35] audit: type=1800 audit(1611904804.787:2883): pid=10503 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=49 res=0 errno=0 07:20:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="0e0000", @ANYRES32], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0xdd, &(0x7f0000000300)=""/221, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) 07:20:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, 0xffffffffffffffff, 0x0, 0x220fff) 07:20:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, &(0x7f0000000140)) 07:20:05 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+'}, 0x16, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(r0, &(0x7f00000009c0), 0x2, &(0x7f0000000a00)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) close(r2) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000340)=@v1={0x1000000, [{0x330, 0x2dd66ae4}]}, 0xc, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x4200, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='key_or_keyring:', &(0x7f0000000300)='\x00', &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f0000000880)='%\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, 0xffffffffffffffff, 0x0, 0x220fff) [ 1402.921815][ T35] audit: type=1804 audit(1611904805.367:2884): pid=10531 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1225/cgroup.controllers" dev="sda1" ino=16343 res=1 errno=0 07:20:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) 07:20:05 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x8, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x0) 07:20:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:06 executing program 0: socketpair(0x11, 0x2, 0xfffffc00, &(0x7f0000000000)) 07:20:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x0) 07:20:06 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}}, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1403.633782][T10573] loop4: detected capacity change from 264192 to 0 [ 1403.655332][ T35] audit: type=1804 audit(1611904806.107:2885): pid=10572 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1226/cgroup.controllers" dev="sda1" ino=16349 res=1 errno=0 07:20:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x16, 0x0, 0x1, 0x1, 0x3}, 0x40) 07:20:06 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)={0x0, 0x989680}, &(0x7f0000000c00)={&(0x7f0000000bc0)={[0x1ffe00]}, 0x8}) 07:20:06 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14], 0x0, r1, 0x0, 0x1}, 0x40) [ 1403.878033][ T35] audit: type=1800 audit(1611904806.187:2886): pid=10573 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=50 res=0 errno=0 07:20:06 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x1f) sendfile(r2, r3, 0x0, 0x0) 07:20:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:06 executing program 0: socketpair(0x2, 0xa, 0x0, &(0x7f0000000380)) 07:20:06 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:06 executing program 5: socketpair(0x0, 0x8080d, 0x0, &(0x7f0000000100)) 07:20:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x16, 0x0, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 07:20:07 executing program 5: ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(0xffffffffffffffff, 0x7b1, &(0x7f0000002040)={0x0, 0x1, 0x0, 0x7, 0x66c}) ioctl$IOCTL_VMCI_CTX_SET_CPT_STATE(0xffffffffffffffff, 0x7b2, &(0x7f0000003080)={&(0x7f0000002080)=[0x0, 0x5, 0x8, 0xfff, 0x2, 0x8, 0x8, 0x7, 0xffffffff, 0x3, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x45, 0x800, 0x0, 0x2, 0x3, 0x0, 0x8000, 0x20, 0x200, 0x0, 0x0, 0x0, 0x6, 0xbded, 0x0, 0x27e2, 0x8, 0x0, 0x8, 0x0, 0x0, 0x57, 0x7ff, 0x7383, 0x0, 0xbe2, 0x0, 0x6, 0x9, 0x3, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x37, 0x5, 0x6, 0x6, 0x4, 0x0, 0x1a, 0x1, 0x1a, 0x3, 0x19cc, 0x7, 0x4, 0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0x0, 0x0, 0x7, 0x0, 0x5, 0x401, 0x401, 0x9, 0x6, 0x7e2, 0x9, 0x3ff, 0x23, 0x0, 0x8, 0x5, 0x0, 0x9, 0x6, 0x84, 0x80000000, 0x0, 0x2, 0x8, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x7fff, 0x0, 0x6, 0x4, 0x0, 0x0, 0xfed5, 0x0, 0x7, 0x0, 0x8, 0x10001, 0x101, 0x9, 0x9, 0x8, 0x8001, 0x7, 0x0, 0xac7, 0x0, 0x9, 0x8, 0x0, 0x0, 0x100, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x7, 0xcd, 0x0, 0xd8, 0x6, 0x0, 0x4, 0x9, 0xff, 0x0, 0x3, 0x2, 0x3, 0x10000, 0x0, 0x0, 0x47b, 0x0, 0x10001, 0x200, 0x0, 0x9ea, 0x288, 0xfffffffb, 0x80, 0x8, 0x7fd39aff, 0x0, 0x0, 0x0, 0x20, 0xffffffff, 0x0, 0x7, 0x0, 0x2, 0xd6cb, 0x7fff, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xc12, 0xd1e, 0x542644ee, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x57, 0x0, 0x9, 0x9, 0x0, 0x10000, 0x7f, 0x1, 0x55aae812, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3ff, 0x101, 0xfff, 0x2, 0x0, 0x0, 0x1, 0x0, 0x4, 0x13e, 0x0, 0x1, 0x0, 0x6, 0x0, 0x1, 0x9, 0xaf, 0x4, 0x6, 0x3, 0x200, 0x0, 0x0, 0x0, 0x9, 0x40, 0xfffffffe, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x5a2, 0x9, 0x1ff, 0x0, 0x6, 0x0, 0x0, 0x3, 0x0, 0x1a1, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x87, 0x0, 0x4, 0x8, 0x5, 0x76b8, 0x6f2, 0x0, 0x0, 0x434, 0x7fff, 0x0, 0x400, 0x6, 0x1ff, 0x0, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x1, 0x7d75f25a, 0x0, 0x0, 0x5, 0x56dd889a, 0x1f, 0x0, 0x10001, 0x8, 0x1, 0x0, 0x1b3, 0x3, 0x0, 0xfffffffc, 0x0, 0x10001, 0x4fcb, 0x0, 0x6ff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7ff, 0x0, 0x101, 0xfffffffe, 0x8, 0x0, 0x0, 0x1, 0x8, 0x0, 0xa2, 0x0, 0x0, 0x99d, 0x9, 0xfd5, 0x5, 0x0, 0x0, 0x0, 0xaf4f, 0x3, 0x0, 0x1, 0x0, 0x1cfa0000, 0x0, 0x3, 0x4, 0x80, 0x5, 0x0, 0x0, 0x9, 0x0, 0x6037, 0x0, 0x5, 0x0, 0x0, 0xa5f, 0x4d1f997d, 0x0, 0xfff, 0x5, 0x80000000, 0x0, 0x0, 0x2, 0x0, 0x80000001, 0x0, 0x2, 0xe0, 0x4, 0x9, 0x4, 0x800, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xfffffffb, 0x2, 0x0, 0x2, 0x401, 0x400, 0x80000001, 0x0, 0xf04, 0x8, 0x9a000000, 0x0, 0x0, 0xffffffff, 0x200, 0x8000, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x2, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x35a, 0x7fff, 0x5, 0xfff, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x54a244ac, 0x1000, 0x0, 0x200, 0x0, 0x7fff, 0x5, 0x3f, 0x80, 0x8000, 0x0, 0x0, 0x5, 0x6, 0x0, 0x0, 0xffffff2a, 0x0, 0x0, 0x3, 0x40, 0x0, 0x7, 0x0, 0x0, 0x6, 0x80000000, 0x0, 0x0, 0x44, 0x2, 0x0, 0x0, 0x2, 0x2ac3740b, 0x3ff, 0x1, 0x7, 0x0, 0x7, 0x0, 0x80000001, 0x0, 0x6, 0xe849, 0x0, 0x4c27, 0x10001, 0x0, 0xa5a2, 0x0, 0x0, 0x400, 0x1, 0x6, 0x200, 0x0, 0x9, 0x0, 0x0, 0x7, 0x400, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffff, 0xfffffff8, 0x4, 0x0, 0x8, 0x3d2f, 0x288, 0x0, 0x3, 0x23f, 0x0, 0x4, 0x80000000, 0x0, 0x8, 0x1000, 0xff, 0x0, 0x0, 0x0, 0x8, 0x200, 0x0, 0x0, 0x0, 0x0, 0x655, 0x7, 0x0, 0x0, 0x666, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x82e1, 0x0, 0x6, 0x24, 0x0, 0x0, 0x0, 0x4c523fed, 0x101, 0x0, 0x80000000, 0x7, 0x7, 0x0, 0x3, 0xc53, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x3, 0x3, 0x0, 0x1, 0x8, 0x0, 0x800, 0x59, 0x5, 0x0, 0x0, 0x1, 0x9, 0x10001, 0x0, 0x354, 0x0, 0x40, 0x0, 0x0, 0x0, 0x2, 0x3, 0x4, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x800, 0xc107, 0xffff, 0x0, 0xffff, 0x0, 0x719b, 0x400, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x29, 0x0, 0x0, 0xf3, 0x2, 0x0, 0x0, 0x400, 0x3, 0x0, 0x49, 0xa0c0, 0x0, 0x80000000, 0x2, 0x0, 0x2, 0x0, 0x0, 0x1000, 0x5, 0x0, 0x7f, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, 0xb43, 0x0, 0x80000000, 0x0, 0x1ff, 0xaef, 0x0, 0x0, 0x3, 0x5, 0x47, 0x3, 0x2000400, 0x0, 0x0, 0x1ff, 0x200000, 0x0, 0x2635, 0x0, 0x0, 0x9290, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x4, 0x80000000, 0xba2a, 0x0, 0x0, 0xffff0000, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, 0x80000001, 0x0, 0x0, 0x8, 0x3ff, 0x8, 0x0, 0x0, 0xb3c, 0x0, 0x8, 0x6, 0x0, 0x3, 0xa1, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x9, 0x20, 0x20, 0x0, 0x1, 0x6, 0x0, 0x7, 0x1ca, 0x0, 0x0, 0x400, 0x800, 0x0, 0x5, 0x2, 0x53, 0x6, 0x3ff, 0xffff, 0x0, 0x1, 0x4, 0x1b, 0x0, 0x0, 0x9, 0x0, 0x8, 0x5dfa, 0x80000000, 0x0, 0x6, 0x9, 0xa9, 0x0, 0x82c, 0xffffffff, 0x1, 0x0, 0x7fff, 0x8000, 0x8, 0x7, 0x0, 0x9, 0xfff, 0x0, 0x1, 0xffffffff, 0x6, 0x0, 0x0, 0x80000001, 0x0, 0x5, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x37, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0xffffffff, 0x7, 0x0, 0x1, 0x1, 0x1, 0x9, 0x9, 0x0, 0x0, 0x0, 0xb6, 0x40, 0x0, 0x0, 0xc81, 0x0, 0x7, 0x9, 0x0, 0xe533, 0x0, 0xc352, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x7, 0x6, 0x3, 0x0, 0x800, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, 0x8000, 0x0, 0xffffffe1, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5, 0x6, 0x7f, 0x5, 0x0, 0x6, 0x6, 0x0, 0x0, 0x8, 0x6, 0x0, 0x800, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x5, 0x0, 0x3, 0x40, 0x7, 0x8506, 0x80, 0x2, 0xc4780db5, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x401, 0x9, 0x0, 0x3, 0x5b, 0x0, 0x0, 0x52b8, 0x89, 0x5, 0x3, 0x0, 0x7f, 0xf4a, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x9, 0x263, 0x0, 0x1, 0xffff922b, 0x0, 0x5b4b, 0x1623, 0x0, 0x6, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0xb7d, 0xe5f, 0x0, 0xf2, 0x0, 0x0, 0x0, 0x7, 0x6, 0xfffffffb, 0x0, 0x3, 0x8f, 0xc0a8, 0x800, 0x5, 0x0, 0x5, 0xffffffff, 0x7f, 0x1f, 0xa516, 0x7, 0x0, 0x100, 0x0, 0x10001, 0x7, 0x280, 0x8, 0x0, 0x8000, 0x5, 0xfffffffe, 0x7, 0x2555, 0x0, 0xfffffffb, 0x3, 0x71fb0000, 0x8, 0x1, 0x0, 0x0, 0x3, 0x5, 0x4, 0x0, 0x0, 0x0, 0x7, 0x4, 0x3, 0x0, 0x0, 0xfffffffc, 0x8, 0x1ff0000, 0x0, 0x0, 0x7fffffff], 0x0, 0x400}) ioctl$IOCTL_VMCI_CTX_SET_CPT_STATE(0xffffffffffffffff, 0x7b2, &(0x7f00000040c0)={&(0x7f00000030c0)=[0x0, 0x7, 0xfffffff9, 0x3f, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x0, 0x3f, 0x2, 0xaf1, 0x2d8, 0x20, 0x4, 0xfa, 0x0, 0x9, 0x8, 0x0, 0x0, 0x40, 0x0, 0x3ff, 0x8000, 0x1f, 0x8001, 0xfa22, 0x0, 0x8001, 0x0, 0x8, 0x1, 0x401, 0x0, 0x0, 0x0, 0x5, 0x727, 0x33ed, 0x0, 0x6, 0x800, 0x3ff, 0x0, 0xff, 0x2, 0x8, 0x8, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x4, 0x0, 0x2, 0x3, 0x0, 0x7fffffff, 0x3, 0x63, 0x0, 0x0, 0x0, 0x0, 0x67dad60f, 0x9, 0x0, 0x2, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x400, 0xfffffffb, 0x1, 0x3, 0x800, 0xc1, 0x2c2a0b25, 0x0, 0x1, 0x7a1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x9, 0x5, 0x7, 0x0, 0x647c1b65, 0x0, 0x5, 0x8, 0x0, 0x7fcf, 0x0, 0x0, 0x5, 0x4f4fa1d2, 0x0, 0x0, 0x5, 0x0, 0xc0000000, 0x8, 0x5, 0xbd, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0xf4, 0x4, 0xfffffffe, 0x7, 0x0, 0x8, 0x10000, 0x9, 0x5, 0x101, 0x401, 0x400, 0x1, 0x0, 0x0, 0x4, 0x8000, 0x7fff, 0x5, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0x0, 0x7, 0xe68, 0x6, 0x6, 0x4896, 0x0, 0x0, 0x200, 0x5, 0x2, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x400, 0x6, 0x1b4c6001, 0x0, 0x8, 0x1, 0x4, 0x1, 0x4, 0x57e, 0xffff, 0xffff, 0x80000000, 0xcdc, 0x0, 0x0, 0x4, 0x4, 0x0, 0xd, 0xfe61, 0x6f, 0x1, 0x855, 0x2830, 0x200, 0x8000, 0x4a, 0x9, 0x80, 0xfffffffc, 0x0, 0x0, 0x0, 0x8, 0x9, 0x1, 0x0, 0x2000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x1, 0x8000, 0xdf9, 0x0, 0x7ff, 0x7, 0x0, 0x1f, 0x200, 0x0, 0x0, 0x0, 0x0, 0xece, 0x0, 0x6, 0x5, 0xdf, 0x2, 0x6, 0x3, 0x0, 0x6, 0x5, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3f, 0xfffffc01, 0x8, 0x10001, 0x6, 0x6, 0x6, 0x93, 0x61ff, 0x9, 0x200, 0x9, 0x9, 0x93e, 0x8, 0x0, 0x0, 0x4, 0x0, 0x10000, 0x235, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0xff, 0x4, 0x0, 0xff, 0xffffffff, 0x0, 0x7, 0x0, 0x0, 0x4, 0x5, 0x8, 0xe9, 0x0, 0x0, 0x10000, 0x0, 0x5, 0x1, 0x7ff, 0x3, 0x4, 0x8, 0x0, 0x7ff, 0x7ff, 0x0, 0x3, 0x3, 0x0, 0xffffffb2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x0, 0xfffffffb, 0x3f, 0x0, 0x3, 0x9, 0x20, 0x0, 0x3ff, 0x81, 0x7, 0x0, 0x3, 0x0, 0x800, 0x0, 0xaec, 0x2, 0x6, 0x8, 0x0, 0x0, 0x7fff, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x20, 0xfffffc01, 0x583, 0x7, 0x0, 0x0, 0x3, 0x0, 0xe272, 0x7, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0xffffff00, 0x1, 0xffffffc9, 0x80000001, 0x2, 0x7fff, 0x0, 0x729, 0x8001, 0x0, 0x0, 0x0, 0x8, 0x0, 0xf9, 0x0, 0x7, 0x0, 0x5, 0x8, 0x0, 0x0, 0x6, 0xffffff76, 0x8, 0x0, 0x0, 0x1, 0x0, 0x7fffffff, 0x1, 0x4, 0x1489, 0x185a, 0x7, 0x0, 0x7, 0x520, 0x1c0, 0x0, 0x0, 0x0, 0x2bc, 0x0, 0x2, 0x8, 0x3, 0x80000001, 0x0, 0x7c, 0x81b, 0x0, 0x7, 0x2, 0x7fff, 0x2a1, 0x0, 0x401, 0x9, 0x0, 0x8, 0x0, 0x3, 0x4, 0x400, 0xd620, 0x0, 0x2, 0x0, 0x35, 0x0, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffa, 0x6, 0x0, 0x0, 0x113e97e5, 0x9, 0x5, 0x0, 0x101, 0x8, 0x0, 0x0, 0x40, 0x1, 0x2bf, 0x401, 0x1, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7f, 0x8001, 0x80000000, 0xe4f4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, 0xffffff00, 0x5602, 0x5c94, 0x3, 0x0, 0x3, 0xafa3, 0x0, 0xbdb, 0xfffffffe, 0x100, 0x0, 0x0, 0x80000001, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x1, 0x0, 0x3, 0x7ff, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x3ff, 0x7, 0xf76b, 0x0, 0x94, 0x0, 0x80000000, 0x5, 0xfffffff7, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x7f, 0x10001, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x908, 0x1c0, 0x1, 0x5, 0x9, 0x0, 0x6, 0x23, 0x7ff, 0x800, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80, 0x3, 0x0, 0x2, 0xa3, 0x5, 0x3, 0x4, 0x0, 0x4, 0x19e, 0x5, 0x0, 0x1843a283, 0x0, 0x0, 0x8, 0x0, 0x1, 0xfca2, 0x0, 0x0, 0x1000, 0xffffffff, 0x0, 0x9, 0x401, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000, 0xffffffff, 0x512e7f18, 0x20000000, 0x81c, 0x0, 0x5ad4e8b1, 0xfffffffe, 0x7, 0x5, 0x1f, 0x0, 0x0, 0x4, 0x0, 0x3, 0x7, 0x7, 0x0, 0x0, 0x0, 0x607c, 0x40, 0x2, 0x81, 0x0, 0x1, 0x3433b228, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x4, 0xfffff5d0, 0x0, 0xd6d9, 0x1f, 0x0, 0xd74e, 0x100, 0x0, 0x0, 0x800, 0x80000001, 0x8000, 0x0, 0x0, 0x0, 0x200, 0x3f, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x8, 0x4, 0x24, 0x6000000, 0x100, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x800, 0x1de, 0x0, 0x0, 0x0, 0x3, 0xfffffffc, 0x200, 0xa82, 0x920b, 0x2, 0x20, 0x58, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x2, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x3f, 0x1, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x0, 0x8, 0x9, 0x1, 0x5, 0x0, 0x9, 0x0, 0x0, 0x7, 0x1, 0x7, 0x7, 0x71f4, 0x5, 0x6d09, 0x9, 0x7, 0x7, 0x0, 0xfff, 0x0, 0x8000, 0x0, 0x0, 0x906, 0x5, 0x0, 0x7f8f6ddb, 0x0, 0x100, 0x0, 0x31, 0x1cb, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20, 0x6, 0x81, 0x0, 0x9, 0x9ec, 0xffffffff, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x56ed, 0x6, 0xeafd, 0xe704, 0x8, 0x8, 0x1, 0x0, 0x7fffffff, 0x2, 0xffff, 0x6, 0x0, 0x170e, 0x1, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x4, 0x6, 0x0, 0x0, 0x9, 0x0, 0xfffeffff, 0x0, 0x200, 0x10001, 0x3, 0x3ff, 0x3, 0x7, 0x7, 0x6, 0x0, 0x1000, 0xc2, 0x0, 0x984, 0x0, 0x0, 0x3, 0x0, 0xfffffffc, 0x2f02, 0x8001, 0x9, 0x0, 0x0, 0x0, 0x9, 0x4, 0x6, 0x1f, 0x3, 0x0, 0x3, 0x2, 0x0, 0x5, 0xd05, 0x7b, 0x0, 0x6, 0x80000000, 0x75705d4f, 0xff, 0x0, 0x4, 0x1f, 0x5, 0x7fffffff, 0x6, 0x800, 0x0, 0x8, 0x762, 0x8001, 0x0, 0x6, 0x0, 0x9, 0x4, 0x3f, 0x0, 0x1ff, 0x0, 0xf3a, 0x6, 0x0, 0x0, 0x0, 0x800, 0x5, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffffff, 0xf08b, 0xfffffff9, 0x8001, 0x0, 0xfff, 0x0, 0x0, 0x1, 0x3a04, 0x4, 0xe4, 0x0, 0x47, 0x10000, 0x2, 0x5, 0x9, 0x1ff, 0x10001, 0x12e8, 0x0, 0xc8, 0x4, 0x6, 0xc8ce, 0xb88f, 0x0, 0x0, 0x6, 0x0, 0x6, 0x1, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0xdead, 0x0, 0x7, 0x0, 0x0, 0xc065, 0x0, 0x0, 0x0, 0x2, 0x2, 0xfffffffd, 0xffffffff, 0x0, 0x0, 0x4, 0x0, 0x4, 0x1, 0xdfc, 0x49f000, 0x0, 0x1ff, 0x8, 0x0, 0xba, 0x9, 0x7, 0x401, 0x80, 0x7ff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x2, 0x83653ae3, 0x0, 0x1, 0x9, 0x0, 0x0, 0x1, 0x6e81, 0x1ff, 0x2, 0x7, 0x2, 0x1, 0x780, 0x7, 0x20, 0x5, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x7, 0x0, 0x8, 0x4, 0x4, 0x2, 0x0, 0x0, 0xaca8, 0x0, 0x0, 0x800, 0x8e, 0x1, 0x0, 0x3f, 0xdfeb, 0x3, 0x4, 0xfffffff7, 0x2, 0x5, 0x1000, 0xffff6f59, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x3], 0x0, 0x400, 0xffffffff, 0x10001}) r0 = syz_open_dev$usbmon(&(0x7f0000004100)='/dev/usbmon#\x00', 0x3, 0x80840) ioctl$IOCTL_VMCI_CTX_REMOVE_NOTIFICATION(0xffffffffffffffff, 0x7b0, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f0000004200)={@host}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, 0x0) ioctl$IOCTL_VMCI_VERSION(0xffffffffffffffff, 0x79f, &(0x7f0000004300)=0xb0000) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, 0x0) 07:20:07 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16], 0x0, r1, 0x0, 0x1}, 0x40) [ 1404.675464][ T35] audit: type=1804 audit(1611904807.117:2887): pid=10614 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1227/cgroup.controllers" dev="sda1" ino=16342 res=1 errno=0 [ 1404.705317][T10615] loop4: detected capacity change from 264192 to 0 07:20:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4}) 07:20:07 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="5500000018007fd500fe01b2a4a28d930a06000000a843089100fe8039000800080011020f0000002d0000009b2c136ef75afb83de448daa72540d8102d2c55327c43ab818cc50de13f3185e83656d4d24", 0x51}, {&(0x7f0000000080)="06e14811", 0x4}], 0x2}, 0x0) [ 1404.873989][ T35] audit: type=1800 audit(1611904807.247:2888): pid=10621 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16330 res=0 errno=0 07:20:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000900)={'gre0\x00', &(0x7f0000000880)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast1}}}}) 07:20:07 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:07 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:07 executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) lsetxattr$security_ima(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="0412"], 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 07:20:07 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:07 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18], 0x0, r1, 0x0, 0x1}, 0x40) [ 1405.245559][T10641] loop4: detected capacity change from 264192 to 0 07:20:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 1405.349153][ T35] audit: type=1804 audit(1611904807.797:2889): pid=10650 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1317/bus" dev="sda1" ino=16326 res=1 errno=0 [ 1405.476781][ T35] audit: type=1800 audit(1611904807.857:2890): pid=10641 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=51 res=0 errno=0 07:20:08 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x0) 07:20:08 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19], 0x0, r1, 0x0, 0x1}, 0x40) [ 1405.810757][ T35] audit: type=1804 audit(1611904808.257:2891): pid=10661 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1228/cgroup.controllers" dev="sda1" ino=16329 res=1 errno=0 [ 1405.869867][T10662] loop1: detected capacity change from 264192 to 0 07:20:08 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:08 executing program 1: socketpair(0x23, 0x0, 0x1, &(0x7f0000001080)) [ 1406.075981][ T35] audit: type=1800 audit(1611904808.497:2892): pid=10666 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=52 res=0 errno=0 07:20:08 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:08 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 1406.541498][T10682] loop4: detected capacity change from 264192 to 0 [ 1406.594163][ T35] audit: type=1800 audit(1611904809.037:2893): pid=10682 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=53 res=0 errno=0 07:20:09 executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) lsetxattr$security_ima(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="0412"], 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 07:20:09 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500803103000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000d94b352a0a2f80c06d5709ffc2c654"}, 0x46) getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 07:20:09 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:09 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:09 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1407.590375][T10699] loop4: detected capacity change from 264192 to 0 07:20:10 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c], 0x0, r1, 0x0, 0x1}, 0x40) [ 1407.930268][ T35] kauditd_printk_skb: 4 callbacks suppressed [ 1407.930286][ T35] audit: type=1804 audit(1611904810.377:2898): pid=10714 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1318/bus" dev="sda1" ino=16365 res=1 errno=0 07:20:10 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:10 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:11 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0xf, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1408.891183][ T35] audit: type=1804 audit(1611904811.337:2899): pid=10732 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1231/cgroup.controllers" dev="sda1" ino=16378 res=1 errno=0 [ 1408.992011][T10733] loop4: detected capacity change from 264192 to 0 [ 1409.012407][ T35] audit: type=1800 audit(1611904811.457:2900): pid=10733 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=55 res=0 errno=0 07:20:12 executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) lsetxattr$security_ima(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="0412"], 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 07:20:12 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:12 executing program 5: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:12 executing program 1: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) 07:20:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:12 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1409.966389][T10714] syz-executor.0 (10714) used greatest stack depth: 22904 bytes left [ 1410.076196][T10752] loop4: detected capacity change from 264192 to 0 07:20:12 executing program 5: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:12 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8906, 0x0) 07:20:12 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21], 0x0, r1, 0x0, 0x1}, 0x40) [ 1410.147045][ T35] audit: type=1804 audit(1611904812.597:2901): pid=10753 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1232/cgroup.controllers" dev="sda1" ino=16369 res=1 errno=0 [ 1410.221103][ T35] audit: type=1804 audit(1611904812.627:2902): pid=10758 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1319/bus" dev="sda1" ino=16363 res=1 errno=0 [ 1410.252082][ T35] audit: type=1800 audit(1611904812.697:2903): pid=10752 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=56 res=0 errno=0 07:20:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:13 executing program 5: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001180)={'gre0\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB="4b7de4cd12c22d4d2a8e81517cee881097376d915b5e469c"]}) [ 1410.781041][ T35] audit: type=1804 audit(1611904813.227:2904): pid=10776 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1233/cgroup.controllers" dev="sda1" ino=16324 res=1 errno=0 07:20:14 executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) lsetxattr$security_ima(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="0412"], 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 07:20:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:14 executing program 1: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000001080)='/dev/qrtr-tun\x00', 0x4000) 07:20:14 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:14 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:14 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23], 0x0, r1, 0x0, 0x1}, 0x40) [ 1412.077865][T10798] loop4: detected capacity change from 264192 to 0 [ 1412.109106][ T35] audit: type=1804 audit(1611904814.557:2905): pid=10794 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1234/cgroup.controllers" dev="sda1" ino=16371 res=1 errno=0 07:20:14 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1412.183835][ T35] audit: type=1800 audit(1611904814.627:2906): pid=10806 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16365 res=0 errno=0 07:20:14 executing program 1: pselect6(0x40, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000b80)={0x0, 0x989680}, 0x0) 07:20:14 executing program 0: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x6b, 0x93, 0x54, 0x10, 0xdf6, 0x21, 0x4c8d, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xd6, 0xa9, 0x5b, 0x0, [], [{}]}}]}}]}}, 0x0) 07:20:14 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:14 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:15 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:15 executing program 1: socketpair(0xf, 0x0, 0x0, &(0x7f0000000040)) 07:20:15 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x2, 0x1}, 0x40) [ 1412.599799][T10824] loop4: detected capacity change from 264192 to 0 07:20:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:15 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1412.694384][ T35] audit: type=1800 audit(1611904815.137:2907): pid=10835 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16364 res=0 errno=0 07:20:15 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:15 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 07:20:15 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) [ 1412.834701][ T4894] usb 1-1: new high-speed USB device number 16 using dummy_hcd [ 1412.981444][ T35] audit: type=1804 audit(1611904815.427:2908): pid=10850 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1235/cgroup.controllers" dev="sda1" ino=16362 res=1 errno=0 [ 1413.094997][ T4894] usb 1-1: Using ep0 maxpacket: 16 [ 1413.215229][ T4894] usb 1-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1413.385716][ T4894] usb 1-1: New USB device found, idVendor=0df6, idProduct=0021, bcdDevice=4c.8d [ 1413.396552][ T4894] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1413.430553][ T4894] usb 1-1: Product: syz [ 1413.438091][ T4894] usb 1-1: Manufacturer: syz [ 1413.442960][ T4894] usb 1-1: SerialNumber: syz [ 1413.452279][ T4894] usb 1-1: config 0 descriptor?? [ 1413.814945][ T4894] usb 1-1: Cannot read MAC address [ 1413.820521][ T4894] MOSCHIP usb-ethernet driver: probe of 1-1:0.0 failed with error -71 [ 1413.834941][ T4894] usb 1-1: USB disconnect, device number 16 [ 1414.504871][ T4894] usb 1-1: new high-speed USB device number 17 using dummy_hcd [ 1414.764801][ T4894] usb 1-1: Using ep0 maxpacket: 16 [ 1414.885115][ T4894] usb 1-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1415.074976][ T4894] usb 1-1: New USB device found, idVendor=0df6, idProduct=0021, bcdDevice=4c.8d [ 1415.084254][ T4894] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1415.100628][ T4894] usb 1-1: Product: syz [ 1415.113749][ T4894] usb 1-1: Manufacturer: syz [ 1415.122536][ T4894] usb 1-1: SerialNumber: syz [ 1415.136816][ T4894] usb 1-1: config 0 descriptor?? 07:20:17 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:17 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8970, &(0x7f0000001900)={'team0\x00'}) 07:20:17 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x3, 0x1}, 0x40) 07:20:17 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:17 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 07:20:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) [ 1415.485001][ T4894] usb 1-1: Cannot read MAC address [ 1415.495127][ T4894] MOSCHIP usb-ethernet driver: probe of 1-1:0.0 failed with error -71 07:20:18 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x0, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1415.554410][T10890] loop4: detected capacity change from 264192 to 0 [ 1415.564201][ T4894] usb 1-1: USB disconnect, device number 17 07:20:18 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8913, &(0x7f0000001900)={'team0\x00'}) [ 1415.636671][ T35] audit: type=1800 audit(1611904818.087:2909): pid=10890 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=57 res=0 errno=0 [ 1415.667046][ T35] audit: type=1804 audit(1611904818.107:2910): pid=10899 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1236/cgroup.controllers" dev="sda1" ino=16365 res=1 errno=0 07:20:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x4, 0x1}, 0x40) 07:20:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 07:20:18 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x0, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x12, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:18 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:18 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x5, 0x1}, 0x40) 07:20:18 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b931dd094c1aa5443d95d1312f014d336b04b030400000000000092290a7e4555a763c1bfe2a08de276ed3ae7a2885e36b884bbcb3f50490f114d83c36515f936e1318eed5a4211763c064750c928f9e04681cfdd5a9b8b775bdbd501133566300f11b45b594a3ccce73bfa1b8b859ff73ac845e77253df938636bcbdeeef274aa294b9999e95c8c8ec26b78932d57aae34f30d6ab83ccccc98c7f4be21faeb127f"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+'}, 0x16, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x2, &(0x7f0000000a00)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) close(r2) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000340)=@v1={0x1000000, [{0x330}]}, 0xc, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, &(0x7f0000000300)='\x00', &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[0x0, &(0x7f0000000780)='%\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', 0x0, &(0x7f0000000900)='asymmetric\x00']) 07:20:18 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x0, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1416.098684][ T35] audit: type=1804 audit(1611904818.547:2911): pid=10924 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1237/cgroup.controllers" dev="sda1" ino=16033 res=1 errno=0 07:20:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 07:20:18 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x6, 0x1}, 0x40) 07:20:18 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1416.243447][T10934] loop4: detected capacity change from 264192 to 0 [ 1416.372854][T10949] ptrace attach of "/root/syz-executor.1"[10933] was attempted by "/root/syz-executor.1"[10949] [ 1416.443882][ T35] audit: type=1800 audit(1611904818.887:2912): pid=10952 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=58 res=0 errno=0 07:20:18 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 07:20:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x7, 0x1}, 0x40) [ 1416.531022][ T35] audit: type=1804 audit(1611904818.887:2913): pid=10950 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1238/cgroup.controllers" dev="sda1" ino=15954 res=1 errno=0 07:20:19 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:19 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) r1 = open(0x0, 0x0, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r2, 0x0, &(0x7f0000000600)) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1, r1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x8, 0x1}, 0x40) 07:20:19 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1416.818631][ T35] audit: type=1804 audit(1611904819.267:2914): pid=10967 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1239/cgroup.controllers" dev="sda1" ino=16242 res=1 errno=0 07:20:19 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 07:20:19 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vxcan1\x00'}) 07:20:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x9, 0x1}, 0x40) 07:20:19 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1416.993696][T10983] loop4: detected capacity change from 264192 to 0 07:20:19 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1417.082414][ T35] audit: type=1800 audit(1611904819.527:2915): pid=10983 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=59 res=0 errno=0 07:20:19 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xa, 0x1}, 0x40) 07:20:19 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:19 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:19 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89a0, &(0x7f0000001900)={'team0\x00'}) 07:20:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) [ 1417.240644][ T35] audit: type=1804 audit(1611904819.687:2916): pid=10996 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1240/cgroup.controllers" dev="sda1" ino=15969 res=1 errno=0 07:20:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xb, 0x1}, 0x40) 07:20:20 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1417.526792][T11018] loop4: detected capacity change from 264192 to 0 07:20:20 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d08, &(0x7f0000000080)) [ 1417.576318][ T35] audit: type=1804 audit(1611904820.027:2917): pid=11017 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1241/cgroup.controllers" dev="sda1" ino=16146 res=1 errno=0 07:20:20 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:20 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={0x0, 0x989680}, 0x0) 07:20:20 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xc, 0x1}, 0x40) 07:20:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x0) 07:20:20 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1418.154266][ T35] kauditd_printk_skb: 1 callbacks suppressed [ 1418.154283][ T35] audit: type=1804 audit(1611904820.597:2919): pid=11041 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1242/cgroup.controllers" dev="sda1" ino=15986 res=1 errno=0 07:20:20 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:20 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:20 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x894c, 0x0) 07:20:20 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xd, 0x1}, 0x40) 07:20:20 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x0) 07:20:20 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xe, 0x1}, 0x40) 07:20:21 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:21 executing program 1: socketpair(0xa, 0x0, 0xf0c9, &(0x7f0000000080)) [ 1418.550976][ T35] audit: type=1804 audit(1611904820.997:2920): pid=11058 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1243/cgroup.controllers" dev="sda1" ino=16209 res=1 errno=0 07:20:21 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:21 executing program 1: pselect6(0x40, &(0x7f0000000140)={0x400000000000}, 0x0, 0x0, 0x0, 0x0) 07:20:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000013b"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x0) [ 1418.626881][T11064] loop4: detected capacity change from 264192 to 0 07:20:21 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:21 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xf, 0x1}, 0x40) 07:20:21 executing program 1: pselect6(0x0, 0x0, 0x0, &(0x7f0000000b40), &(0x7f0000000b80)={0x0, 0x989680}, 0x0) 07:20:21 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1418.776801][ T35] audit: type=1800 audit(1611904821.207:2921): pid=11074 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16082 res=0 errno=0 [ 1418.921145][ T35] audit: type=1804 audit(1611904821.367:2922): pid=11081 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir113167898/syzkaller.uaBxn0/1244/cgroup.controllers" dev="sda1" ino=15954 res=1 errno=0 07:20:21 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:21 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x10, 0x1}, 0x40) 07:20:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000100)="aa", 0x1}, {&(0x7f00000001c0)="b0", 0x1100}], 0x2) 07:20:21 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:21 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, 0x0, 0x0) [ 1419.225808][T11092] loop4: detected capacity change from 264192 to 0 07:20:21 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5452, &(0x7f0000001900)={'team0\x00'}) 07:20:21 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:21 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:21 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:21 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x11, 0x1}, 0x40) 07:20:22 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x4020940d, &(0x7f0000001900)={'team0\x00'}) [ 1419.550090][T11115] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1419.588383][T11120] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:22 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:22 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x15, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1419.648113][T11124] loop4: detected capacity change from 264192 to 0 07:20:22 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x12, 0x1}, 0x40) [ 1419.683163][ T35] audit: type=1800 audit(1611904822.127:2923): pid=11124 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=61 res=0 errno=0 [ 1419.896883][T11134] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:22 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:20:22 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:22 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:22 executing program 3: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b931dd094c1aa5443d95d1312f014d336b04b030400000000000092290a7e4555a763c1bfe2a08de276ed3ae7a2885e36b884bbcb3f50490f114d83c36515f936e1318eed5a4211763c06"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+'}, 0x16, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[0x0, &(0x7f0000000240)='key_or_keyring:', &(0x7f0000000300)='\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000880)='%\x00', 0x0, &(0x7f0000000900)='asymmetric\x00']) 07:20:22 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x13, 0x1}, 0x40) [ 1420.320765][T11149] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:22 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:22 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:23 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:23 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x14, 0x1}, 0x40) 07:20:23 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1420.655883][T11157] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1420.809738][T11163] loop4: detected capacity change from 264192 to 0 07:20:23 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x15, 0x1}, 0x40) 07:20:23 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:23 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) 07:20:23 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891e, &(0x7f0000001900)={'team0\x00'}) 07:20:23 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:23 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:23 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x16, 0x1}, 0x40) 07:20:23 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:23 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1421.340581][T11188] loop4: detected capacity change from 264192 to 0 07:20:23 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b93"], 0x191) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:24 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="0e000000", @ANYRES32, @ANYBLOB="000000003f000000b41a180000000000559130"], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0xdd, &(0x7f0000000300)=""/221, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:24 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x17, 0x1}, 0x40) 07:20:24 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x700) 07:20:24 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:24 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:24 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x18, 0x1}, 0x40) 07:20:24 executing program 3: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) [ 1421.743537][T11212] loop4: detected capacity change from 264192 to 0 07:20:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6c00000011008b1f00000000000000019dd305a3", @ANYRES32=0x0, @ANYBLOB="5d080300000000001c001a8018000a801400070000000000000000000000000000000001140003006970766c616e31"], 0x6c}, 0x1, 0x0, 0x0, 0x10}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x8c2, 0x0) 07:20:24 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x19, 0x1}, 0x40) 07:20:24 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1422.011237][T11229] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:20:24 executing program 0: close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x13, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:24 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r0, 0x0, &(0x7f0000000600)) io_cancel(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:24 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="0e00", @ANYRES32, @ANYBLOB="000000003f000000b41a180000000000559130"], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0xdd, &(0x7f0000000300)=""/221, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1422.377591][T11250] loop4: detected capacity change from 264192 to 0 [ 1422.407238][ T35] audit: type=1800 audit(1611904824.857:2924): pid=11250 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=62 res=0 errno=0 07:20:25 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1a, 0x1}, 0x40) 07:20:25 executing program 0: close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1422.525276][T11257] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:20:25 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:25 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000001100)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000001180)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 07:20:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6c00000011008b1f00000000000000019dd305a3", @ANYRES32=0x0, @ANYBLOB="5d080300000000001c001a8018000a801400070000000000000000000000000000000001140003006970766c616e31"], 0x6c}, 0x1, 0x0, 0x0, 0x10}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x8c2, 0x0) 07:20:25 executing program 0: close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1422.792830][T11266] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:25 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1b, 0x1}, 0x40) 07:20:25 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r0, 0x0, &(0x7f0000000600)) io_cancel(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYBLOB="4400000024000b0f001000"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000009000100677265640000000014000200100003000ac5"], 0x44}}, 0x0) 07:20:25 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1422.988923][T11273] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:20:25 executing program 0: r0 = creat(0x0, 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:25 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1c, 0x1}, 0x40) 07:20:25 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001900)={0x18, 0x4, &(0x7f0000001740)=@framed={{}, [@func]}, &(0x7f0000001780)='syzkaller\x00', 0x6, 0xa9, &(0x7f00000017c0)=""/169, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001180)={'gre0\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB="4b7de4cd12c22d4d2a8e81517cee881097"]}) [ 1423.168410][T11284] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1423.206440][T11286] loop4: detected capacity change from 264192 to 0 07:20:25 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1423.339228][ T35] audit: type=1800 audit(1611904825.787:2925): pid=11297 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16383 res=0 errno=0 07:20:25 executing program 0: r0 = creat(0x0, 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x0, 0x0, 0x8}, 0x40) 07:20:25 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8923, &(0x7f0000001900)={'team0\x00'}) 07:20:25 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:26 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r0, 0x0, &(0x7f0000000600)) io_cancel(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:26 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1d, 0x1}, 0x40) 07:20:26 executing program 0: r0 = creat(0x0, 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63e61db422914e33, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:26 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:26 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1e, 0x1}, 0x40) 07:20:26 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1423.729670][T11321] loop4: detected capacity change from 264192 to 0 [ 1423.887680][ T35] audit: type=1800 audit(1611904826.337:2926): pid=11328 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16382 res=0 errno=0 07:20:26 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:26 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x21, 0x1}, 0x40) 07:20:26 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0xf, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x6}, @exit, @btf_id, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @initr0, @generic, @ldst]}, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:26 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r0, 0x0, &(0x7f0000000600)) io_cancel(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:26 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:26 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1424.160740][ T35] audit: type=1800 audit(1611904826.607:2927): pid=11332 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16371 res=0 errno=0 07:20:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:26 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x22, 0x1}, 0x40) 07:20:26 executing program 5: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f00000000c0)={'L+'}, 0x16, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='key_or_keyring:', 0x0, &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1424.380587][T11359] loop4: detected capacity change from 264192 to 0 07:20:26 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:26 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1424.419378][ T35] audit: type=1800 audit(1611904826.867:2928): pid=11359 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=63 res=0 errno=0 07:20:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1424.582345][T11371] __nla_validate_parse: 4 callbacks suppressed [ 1424.582364][T11371] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:27 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8912, &(0x7f0000001900)={'team0\x00'}) 07:20:27 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x23, 0x1}, 0x40) 07:20:27 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1424.994357][T11383] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:27 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r0, 0x0, &(0x7f0000000600)) io_cancel(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:27 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x3) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x3c}}, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:27 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x300, 0x1}, 0x40) 07:20:27 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x30}}, 0x0) 07:20:27 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x3) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed={{}, [], {0x95, 0x0, 0x0, 0x2}}, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:27 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x500, 0x1}, 0x40) [ 1425.400272][T11403] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1425.478592][T11404] loop4: detected capacity change from 264192 to 0 07:20:28 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r2, r4, 0x0, 0x220fff) 07:20:28 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r0, 0x0, &(0x7f0000000600)) io_cancel(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040), 0x4) fstatfs(r2, &(0x7f0000000440)=""/254) 07:20:28 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x3) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:28 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x600, 0x1}, 0x40) [ 1425.782714][T11421] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:28 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r2, r4, 0x0, 0x220fff) [ 1425.887472][T11428] loop4: detected capacity change from 264192 to 0 07:20:28 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:28 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b931dd094c1aa5443d95d1312f014d336b04b030400000000000092290a7e4555a763c1bfe2a08de276ed3ae7a2885e36b884bbcb3f50490f114d83c36515f936e1318eed5a4211763c064750c928f9e04681cfdd5a9b8b775bdbd501133566300f11b45b594a3ccce73bfa1b8b859ff73ac845e77253df938636bcbdeeef274aa294b9999e95c8c8ec26b78932d57aae34f30d6ab83ccccc98c7f4be21faeb127f0300000000000000abfcdf08c7cb96e8c156416cfc1b23c88af0143a2526937921d2e34496a0ca4d71227b362a942c59f08cd8e4ba8a46a6f6340a85d96c168e5f1201fe3f97c1bd3b8f845813c55433aeb54e163ce3e3211375672d79a0bcf0fef5a28cd0782fe4187c958a8a154e03e5dff816eb001fab34d5904f346ba64441d98e9de99f6b3069664ab79a1024ce9fac129416b568648fe476870e27d734ed3fe05f15384d0942f0f723c3de390a7a53ce5a4f2640f43ac6145b9ed02503225ff603715d9ce89da15c89af6b83a4b2439dce75db38f8d7a3961efe9a7fb3f7cbe85d6acb0eb8a4619effbaf4aedf28ca98540a3b66b4bfe020afaff82343e7e8179f763f268d555658db62a00389084b3580c9f961ec2114"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) wait4(r0, &(0x7f00000009c0), 0x2, &(0x7f0000000a00)) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) close(0xffffffffffffffff) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000780)='%\x00', 0x0, &(0x7f0000000900)='asymmetric\x00']) [ 1426.004793][ T35] audit: type=1800 audit(1611904828.447:2929): pid=11436 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16178 res=0 errno=0 07:20:28 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x700, 0x1}, 0x40) [ 1426.093151][T11440] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:28 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:28 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:28 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r2, r4, 0x0, 0x220fff) 07:20:28 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x900, 0x1}, 0x40) 07:20:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r2, 0xffffffffffffffff, 0x0, 0x220fff) 07:20:29 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:29 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:29 executing program 5: waitid(0x0, 0x0, 0x0, 0x20000006, 0x0) 07:20:29 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xa00, 0x1}, 0x40) 07:20:29 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r2, 0xffffffffffffffff, 0x0, 0x220fff) 07:20:29 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:29 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xb00, 0x1}, 0x40) 07:20:29 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x14, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:29 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r2, 0xffffffffffffffff, 0x0, 0x220fff) 07:20:29 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:29 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xc00, 0x1}, 0x40) 07:20:29 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:29 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:29 executing program 5: openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/clear_refs\x00', 0x1, 0x0) 07:20:29 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xd00, 0x1}, 0x40) 07:20:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r2, r3, 0x0, 0x220fff) 07:20:29 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r2, r3, 0x0, 0x220fff) 07:20:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3081"], 0x30}}, 0x0) 07:20:30 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:30 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:30 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xe00, 0x1}, 0x40) 07:20:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r2, r3, 0x0, 0x220fff) [ 1427.708930][T11539] loop4: detected capacity change from 264192 to 0 07:20:30 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1427.769463][ T35] audit: type=1800 audit(1611904830.217:2930): pid=11539 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15954 res=0 errno=0 07:20:30 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:30 executing program 5: pselect6(0x40, &(0x7f0000000140)={0x400000000000}, &(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)={0x0, 0x989680}, &(0x7f0000000c00)={&(0x7f0000000bc0)={[0x1ffe00]}, 0x8}) 07:20:30 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xf00, 0x1}, 0x40) 07:20:30 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:30 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) read$midi(0xffffffffffffffff, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r2, r3, 0x0, 0x220fff) 07:20:30 executing program 5: ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000040)={'veth1_to_bridge\x00'}) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 07:20:30 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:30 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1100, 0x1}, 0x40) [ 1428.254457][T11571] loop4: detected capacity change from 264192 to 0 07:20:30 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1428.359179][ T35] audit: type=1800 audit(1611904830.807:2931): pid=11571 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16383 res=0 errno=0 07:20:30 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x18, 0x0, 0x0) 07:20:30 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:31 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1200, 0x1}, 0x40) 07:20:31 executing program 1: vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 07:20:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1d, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:31 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1300, 0x1}, 0x40) 07:20:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) read$midi(0xffffffffffffffff, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r2, r3, 0x0, 0x220fff) 07:20:31 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1428.875347][T11603] loop4: detected capacity change from 264192 to 0 07:20:31 executing program 1: vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) [ 1428.971658][ T35] audit: type=1800 audit(1611904831.417:2932): pid=11603 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16113 res=0 errno=0 07:20:31 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1f, 0x0) read$usbmon(r0, &(0x7f0000000080)=""/4096, 0x1000) 07:20:31 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', 0x0, 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:31 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1400, 0x1}, 0x40) 07:20:31 executing program 1: vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 07:20:31 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89a1, 0x0) [ 1429.341179][T11628] loop4: detected capacity change from 264192 to 0 07:20:31 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8940, &(0x7f0000001900)={'team0\x00'}) 07:20:31 executing program 1: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 07:20:31 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:32 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', 0x0, 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:32 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1500, 0x1}, 0x40) 07:20:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x81, 0x80000001, 0x0, 0x1}, 0x40) [ 1429.789794][T11652] loop4: detected capacity change from 264192 to 0 07:20:32 executing program 1: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 07:20:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) read$midi(0xffffffffffffffff, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r2, r3, 0x0, 0x220fff) 07:20:32 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:32 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1600, 0x1}, 0x40) 07:20:32 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, 0x0) 07:20:32 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', 0x0, 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:32 executing program 1: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 07:20:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x395, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1430.311188][T11689] loop4: detected capacity change from 264192 to 0 07:20:32 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:32 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1700, 0x1}, 0x40) 07:20:32 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1e, 0x0, 0x0) 07:20:33 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1800, 0x1}, 0x40) 07:20:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:33 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:33 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:33 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:33 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x0) read$usbmon(r0, &(0x7f0000001080)=""/4096, 0xfffffffffffffedd) 07:20:33 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1900, 0x1}, 0x40) [ 1430.904951][T11721] FAT-fs (loop4): bogus number of reserved sectors 07:20:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0xdd, &(0x7f0000000300)=""/221, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:33 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1430.965656][T11721] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1430.980854][ T35] audit: type=1800 audit(1611904833.427:2933): pid=11732 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16383 res=0 errno=0 07:20:33 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:33 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1a00, 0x1}, 0x40) 07:20:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:33 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:33 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:33 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDCTL_DSP_SETDUPLEX(0xffffffffffffffff, 0x5016, 0x0) clone(0xe1004d7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDCTL_DSP_GETOPTR(0xffffffffffffffff, 0x800c5012, &(0x7f00000000c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 07:20:33 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:33 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1b00, 0x1}, 0x40) 07:20:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1431.446740][T11754] FAT-fs (loop4): bogus number of reserved sectors [ 1431.502396][T11757] IPVS: ftp: loaded support on port[0] = 21 [ 1431.523438][ T35] audit: type=1800 audit(1611904833.937:2934): pid=11761 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16014 res=0 errno=0 [ 1431.546546][T11754] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:34 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:34 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1c00, 0x1}, 0x40) 07:20:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(0xffffffffffffffff, r3, 0x0, 0x220fff) 07:20:34 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:34 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:34 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1d00, 0x1}, 0x40) 07:20:34 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}], 0x1, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1431.971331][T11803] FAT-fs (loop4): bogus number of reserved sectors [ 1432.003759][T11803] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1432.023118][T11763] IPVS: ftp: loaded support on port[0] = 21 [ 1432.044955][ T35] audit: type=1800 audit(1611904834.487:2935): pid=11812 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16380 res=0 errno=0 07:20:34 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(0x0, &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:34 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(0xffffffffffffffff, r3, 0x0, 0x220fff) 07:20:34 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1e00, 0x1}, 0x40) 07:20:34 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}], 0x1, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:34 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:34 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(0x0, &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) 07:20:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(0xffffffffffffffff, r3, 0x0, 0x220fff) 07:20:35 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1f00, 0x1}, 0x40) 07:20:35 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}], 0x1, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:35 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(0x0, &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x7ffff, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:35 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) 07:20:35 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x2000, 0x1}, 0x40) 07:20:35 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {0x0}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x1, &(0x7f0000001080)=@raw=[@jmp], &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:35 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:35 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x2100, 0x1}, 0x40) 07:20:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f0000000040)={0x0, 0xffffffffffffffff}, 0x0) 07:20:35 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {0x0}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:35 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) 07:20:35 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x2200, 0x1}, 0x40) 07:20:35 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x14, r1, 0x1}, 0x14}}, 0x0) 07:20:36 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {0x0}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:36 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:36 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x2300, 0x1}, 0x40) 07:20:36 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:36 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x1) write$proc_mixer(r0, 0x0, 0x0) 07:20:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) 07:20:36 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1434.080606][T11937] loop4: detected capacity change from 264192 to 0 [ 1434.113602][T11937] FAT-fs (loop4): bogus number of reserved sectors 07:20:36 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1434.150211][T11937] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1434.241682][ T35] audit: type=1800 audit(1611904836.687:2936): pid=11947 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16370 res=0 errno=0 07:20:36 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1000000, 0x1}, 0x40) 07:20:36 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8983, &(0x7f0000001900)={'team0\x00'}) 07:20:36 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r1, &(0x7f0000000440)=""/4097, 0x1001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x220fff) 07:20:36 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x2000000, 0x1}, 0x40) 07:20:37 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x1) read$proc_mixer(r0, 0x0, 0x0) 07:20:37 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0, &(0x7f00000005c0)='\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1434.582080][T11966] loop4: detected capacity change from 264192 to 0 [ 1434.635511][T11966] FAT-fs (loop4): bogus number of reserved sectors [ 1434.643347][T11966] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:37 executing program 5: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000b00)={0x1}, 0x0, 0x0, 0x0) 07:20:37 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="e5", 0x1}], 0x1, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r1, &(0x7f0000000440)=""/4097, 0x1001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x220fff) 07:20:37 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0, 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:37 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x3000000, 0x1}, 0x40) 07:20:37 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8932, &(0x7f0000001900)={'team0\x00'}) 07:20:37 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="e5", 0x1}], 0x1, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r1, &(0x7f0000000440)=""/4097, 0x1001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x220fff) [ 1435.185049][T12006] loop4: detected capacity change from 264192 to 0 07:20:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x4000000, 0x1}, 0x40) [ 1435.230222][T12006] FAT-fs (loop4): bogus number of reserved sectors [ 1435.237836][T12006] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:37 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="5500000018007fd500fe01b2a4a28d930a06000000a843089100fe8039000800080011000f0000002d0000009b2c136ef75afb83de448daa72540d8102d2c55327c43ab818cc50de13f3185e83656d4d24", 0x51}, {&(0x7f0000000080)="06e14811", 0x4}], 0x2}, 0x0) 07:20:37 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) 07:20:37 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0, 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:37 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="e5", 0x1}], 0x1, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:38 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:38 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x5000000, 0x1}, 0x40) 07:20:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001900)={0x18, 0x4, &(0x7f0000001740)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000001780)='syzkaller\x00', 0x6, 0xa9, &(0x7f00000017c0)=""/169, 0x0, 0x13, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:38 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000000)="e5", 0x1}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:38 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1435.765340][T12038] loop4: detected capacity change from 264192 to 0 07:20:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000003100010000000000000000000074000034000100300001"], 0x48}, 0x7}, 0x0) 07:20:38 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x6000000, 0x1}, 0x40) 07:20:38 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) [ 1435.875639][T12038] FAT-fs (loop4): bogus number of reserved sectors [ 1435.912089][T12038] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1435.932995][ T35] audit: type=1800 audit(1611904838.377:2937): pid=12044 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16365 res=0 errno=0 07:20:38 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', 0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:38 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:38 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000000)="e5", 0x1}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1436.121799][T12056] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 07:20:38 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x7000000, 0x1}, 0x40) [ 1436.195288][T12059] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 07:20:38 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000000)="e5", 0x1}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1436.309520][T12066] loop4: detected capacity change from 264192 to 0 07:20:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1b, 0x0, 0x0) [ 1436.389437][T12066] FAT-fs (loop4): bogus number of reserved sectors [ 1436.401652][ T35] audit: type=1800 audit(1611904838.847:2938): pid=12072 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16369 res=0 errno=0 07:20:38 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) [ 1436.470637][T12066] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:39 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x8000000, 0x1}, 0x40) 07:20:39 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:39 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)}, {&(0x7f0000000000)="e5", 0x1}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:39 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x2}}, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:39 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:39 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x9000000, 0x1}, 0x40) [ 1436.865912][T12096] loop4: detected capacity change from 264192 to 0 07:20:39 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:39 executing program 5: timer_create(0x0, 0x0, &(0x7f00000021c0)) 07:20:39 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)}, {&(0x7f0000000000)="e5", 0x1}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:39 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:39 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xa000000, 0x1}, 0x40) 07:20:39 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8947, &(0x7f0000001900)={'team0\x00'}) 07:20:39 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:39 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)}, {&(0x7f0000000000)="e5", 0x1}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:39 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xb000000, 0x1}, 0x40) 07:20:39 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r0, 0x80044dfd, &(0x7f0000000080)) 07:20:39 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1437.457622][T12128] loop4: detected capacity change from 264192 to 0 07:20:40 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640), &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1437.577115][T12128] FAT-fs (loop4): bogus number of reserved sectors [ 1437.620163][ T35] audit: type=1800 audit(1611904840.067:2939): pid=12133 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16380 res=0 errno=0 07:20:40 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1437.683266][T12128] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:40 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xc000000, 0x1}, 0x40) 07:20:40 executing program 5: socketpair(0x1e, 0x0, 0xfff, &(0x7f00000002c0)) 07:20:40 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:40 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:40 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xd000000, 0x1}, 0x40) 07:20:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00'}) 07:20:40 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640), &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:40 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:40 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1438.143884][T12159] loop4: detected capacity change from 264192 to 0 [ 1438.291254][T12159] FAT-fs (loop4): bogus number of reserved sectors [ 1438.293606][ T35] audit: type=1800 audit(1611904840.737:2940): pid=12165 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16378 res=0 errno=0 [ 1438.353647][T12159] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:40 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xe000000, 0x1}, 0x40) 07:20:40 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0xb, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:41 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:41 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640), &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:41 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) 07:20:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0xf000000, 0x1}, 0x40) 07:20:41 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) read$proc_mixer(r0, &(0x7f00000000c0)=""/4096, 0x1000) [ 1438.747809][T12189] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1438.801103][T12192] loop4: detected capacity change from 264192 to 0 07:20:41 executing program 5: socketpair(0x15, 0x5, 0x9, &(0x7f0000000140)) [ 1438.850681][T12192] FAT-fs (loop4): bogus number of reserved sectors [ 1438.858277][T12192] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:41 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x10000000, 0x1}, 0x40) 07:20:41 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:20:41 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:41 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x21, 0x0, 0x0) 07:20:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) [ 1439.246588][T12210] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:41 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x11000000, 0x1}, 0x40) 07:20:41 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1439.392608][T12221] loop4: detected capacity change from 264192 to 0 [ 1439.472141][ T35] audit: type=1800 audit(1611904841.917:2941): pid=12227 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16363 res=0 errno=0 [ 1439.530969][T12221] FAT-fs (loop4): bogus number of reserved sectors [ 1439.554407][T12229] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:42 executing program 5: request_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='-!\'-&&\x00', 0x0) [ 1439.609496][T12221] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:42 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x12000000, 0x1}, 0x40) 07:20:42 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:42 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x80108906, 0x0) 07:20:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) [ 1439.903076][T12247] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x13000000, 0x1}, 0x40) 07:20:42 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[0x0], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1439.993094][T12251] loop4: detected capacity change from 264192 to 0 07:20:42 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1440.101492][T12251] FAT-fs (loop4): bogus number of reserved sectors [ 1440.142213][ T35] audit: type=1800 audit(1611904842.587:2942): pid=12257 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16376 res=0 errno=0 07:20:42 executing program 5: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000200)) [ 1440.189468][T12251] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1440.215793][T12265] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x14000000, 0x1}, 0x40) 07:20:42 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:42 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) 07:20:42 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], 0x0) 07:20:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x7ffff, 0x0, 0x0) [ 1440.515517][T12278] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x15000000, 0x1}, 0x40) [ 1440.673294][T12288] loop4: detected capacity change from 264192 to 0 [ 1440.685471][T12288] FAT-fs (loop4): bogus number of reserved sectors [ 1440.693316][T12288] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:43 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001900)={0x18, 0x3, &(0x7f0000001740)=@framed, &(0x7f0000001780)='syzkaller\x00', 0x6, 0xa9, &(0x7f00000017c0)=""/169, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:43 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], 0x0) 07:20:43 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x541b, &(0x7f0000001900)={'team0\x00'}) [ 1440.937978][T12304] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:43 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) 07:20:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x16000000, 0x1}, 0x40) 07:20:43 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:43 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xa8013, r0, 0x0) 07:20:43 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], 0x0) [ 1441.200389][T12318] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1441.209882][T12320] loop4: detected capacity change from 264192 to 0 [ 1441.234375][T12320] FAT-fs (loop4): invalid media value (0x00) [ 1441.261890][T12320] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:43 executing program 5: sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x3dcf401cae58e7de) [ 1441.359657][ T35] audit: type=1800 audit(1611904843.807:2943): pid=12326 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16368 res=0 errno=0 07:20:43 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x17000000, 0x1}, 0x40) 07:20:43 executing program 5: r0 = open(&(0x7f0000000680)='./file0\x00', 0x8a040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x1) 07:20:44 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f00000008c0)='}\x00']) 07:20:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) 07:20:44 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1441.609652][T12339] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x18000000, 0x1}, 0x40) 07:20:44 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1441.758626][T12350] loop4: detected capacity change from 264192 to 0 [ 1441.782872][T12350] FAT-fs (loop4): invalid media value (0x00) [ 1441.789259][T12350] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:44 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1441.911510][T12363] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x19000000, 0x1}, 0x40) 07:20:44 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00']) 07:20:44 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) 07:20:44 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) [ 1442.112146][T12371] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:44 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1a000000, 0x1}, 0x40) [ 1442.295113][T12385] loop4: detected capacity change from 264192 to 0 [ 1442.310833][T12385] FAT-fs (loop4): invalid media value (0x00) [ 1442.317940][T12385] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:44 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001900)={'team0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1442.336818][ T35] audit: type=1800 audit(1611904844.787:2944): pid=12385 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16365 res=0 errno=0 [ 1442.376004][T12388] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:45 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00']) 07:20:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) 07:20:45 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x0, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:45 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1b000000, 0x1}, 0x40) 07:20:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x16, 0x0, 0x1, 0x1}, 0x40) [ 1442.803942][T12410] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1442.824385][T12409] loop4: detected capacity change from 264192 to 0 [ 1442.845160][T12409] FAT-fs (loop4): invalid media value (0x00) [ 1442.857928][T12409] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:45 executing program 5: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="5500000018007fd500fe01b2a4a28d930a06000000a843089100fe8039000800080011000f0000002d0000009b2c136ef75afb83de448daa72540d8102d2c55327c43ab818cc50de13f3185e83656d4d24", 0x51}, {&(0x7f0000000080)="06e14811", 0x4}], 0x2}, 0x0) 07:20:45 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x0, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:45 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00']) 07:20:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1c000000, 0x1}, 0x40) 07:20:45 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r2, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r1, r3, 0x0, 0x220fff) 07:20:45 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 1443.342965][T12444] loop4: detected capacity change from 264192 to 0 [ 1443.355597][T12448] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1443.377964][T12444] FAT-fs (loop4): invalid media value (0x00) 07:20:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1d000000, 0x1}, 0x40) [ 1443.388093][T12444] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:46 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x0, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:46 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00']) 07:20:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1e000000, 0x1}, 0x40) 07:20:46 executing program 5: timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000040)) 07:20:46 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1443.775762][T12478] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1443.827777][T12483] loop4: detected capacity change from 264192 to 0 07:20:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1443.875513][T12483] FAT-fs (loop4): invalid media value (0x00) [ 1443.909366][T12483] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:46 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00']) 07:20:46 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) socket$inet6(0xa, 0x2, 0x0) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x1f000000, 0x1}, 0x40) 07:20:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:46 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00']) [ 1444.196632][T12500] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:46 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x7, 0x0, 0x0) 07:20:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x20000000, 0x1}, 0x40) 07:20:46 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) socket$inet6(0xa, 0x2, 0x0) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1444.458023][T12516] loop4: detected capacity change from 264192 to 0 07:20:46 executing program 5: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x127d82) [ 1444.550658][T12521] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1444.573015][ T35] audit: type=1800 audit(1611904847.017:2945): pid=12524 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16383 res=0 errno=0 [ 1444.595582][T12516] FAT-fs (loop4): bogus number of FAT sectors 07:20:47 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00']) [ 1444.668549][T12516] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x21000000, 0x1}, 0x40) 07:20:47 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) socket$inet6(0xa, 0x2, 0x0) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:47 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x16, 0x191, 0x0, 0x1}, 0x40) [ 1445.025146][T12546] loop4: detected capacity change from 264192 to 0 07:20:47 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x1a, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:47 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="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", 0x400}], 0x0, &(0x7f0000000900)=ANY=[]) 07:20:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x22000000, 0x1}, 0x40) [ 1445.087208][T12546] FAT-fs (loop4): bogus number of FAT sectors [ 1445.116226][ T35] audit: type=1800 audit(1611904847.567:2946): pid=12553 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16378 res=0 errno=0 07:20:47 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00']) [ 1445.185937][T12556] loop5: detected capacity change from 2 to 0 [ 1445.197389][T12556] MTD: Attempt to mount non-MTD device "/dev/loop5" [ 1445.205559][T12556] romfs: Mounting image 'rom 5f663c08' through the block layer [ 1445.210692][T12546] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:47 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x23000000, 0x1}, 0x40) 07:20:47 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000880)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x41) 07:20:48 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x2}, 0x40) 07:20:48 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:48 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)) [ 1445.745391][T12583] loop4: detected capacity change from 264192 to 0 [ 1445.772747][T12583] FAT-fs (loop4): bogus number of FAT sectors 07:20:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1e, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1445.792670][T12583] FAT-fs (loop4): Can't find a valid FAT filesystem 07:20:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x3}, 0x40) 07:20:48 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000103c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r1, &(0x7f0000004200)="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", 0x2000, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) splice(r0, &(0x7f00000000c0)=0x9, r1, &(0x7f0000000100)=0x9, 0x7fffffff, 0x1) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="39000000130009006900000000000000ab00800020000000460001070700001419000100100000080000506800000000ff00ef38bf461e59d7", 0x39}], 0x1) 07:20:48 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)) 07:20:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:48 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x4}, 0x40) 07:20:48 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1446.317820][T12625] loop4: detected capacity change from 264192 to 0 [ 1446.381450][ T35] audit: type=1800 audit(1611904848.827:2947): pid=12625 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16051 res=0 errno=0 [ 1446.455391][T12611] bridge0: port 2(bridge_slave_1) entered disabled state [ 1446.640315][T12624] __nla_validate_parse: 4 callbacks suppressed [ 1446.640336][T12624] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:49 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)) 07:20:49 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x5}, 0x40) 07:20:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000280)) 07:20:49 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1446.872137][T12648] loop4: detected capacity change from 264192 to 0 [ 1446.909249][ T35] audit: type=1800 audit(1611904849.357:2948): pid=12648 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16018 res=0 errno=0 07:20:49 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1446.986033][T12661] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x6}, 0x40) 07:20:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1447.113897][T12666] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:49 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[0x0]) 07:20:49 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000100)=0x1, 0x4) 07:20:49 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:49 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x7}, 0x40) [ 1447.353232][T12681] loop4: detected capacity change from 264192 to 0 07:20:49 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89b0, &(0x7f0000001900)={'team0\x00'}) 07:20:49 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1447.397659][ T35] audit: type=1800 audit(1611904849.847:2949): pid=12681 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15794 res=0 errno=0 07:20:49 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[0x0]) 07:20:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x8}, 0x40) 07:20:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:50 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00'], &(0x7f0000000940)=[0x0]) 07:20:50 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:50 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:50 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x2, &(0x7f0000001900)={'team0\x00'}) 07:20:50 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1447.851909][T12714] loop4: detected capacity change from 264192 to 0 07:20:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1}, 0x40) 07:20:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:50 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1447.960381][ T35] audit: type=1800 audit(1611904850.407:2950): pid=12714 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=64 res=0 errno=0 07:20:50 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000180)) 07:20:50 executing program 0: r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r0, 0xd23, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x30}}, 0x0) 07:20:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x2}, 0x40) 07:20:50 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xe, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:50 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000dc0)={'wlan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='q\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000000000013b00000008000300", @ANYRES32=r6, @ANYBLOB="3200330050000000ffffffffffff080211000001"], 0x50}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 07:20:51 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x3}, 0x40) 07:20:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001180)={'gre0\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB="4b7de4cd12c22d4d2a8e81517cee881097376d915b5e46"]}) 07:20:51 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1448.751142][ T35] audit: type=1804 audit(1611904851.197:2951): pid=12745 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir851198559/syzkaller.P9MAZ7/1408/cgroup.controllers" dev="sda1" ino=15781 res=1 errno=0 [ 1448.797030][T12745] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.0'. 07:20:51 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="0e"], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0xdd, &(0x7f0000000300)=""/221, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x4}, 0x40) [ 1448.952401][T12759] loop4: detected capacity change from 264192 to 0 07:20:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x21, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1449.030716][ T35] audit: type=1800 audit(1611904851.477:2952): pid=12764 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15813 res=0 errno=0 07:20:51 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000024c0)={0x0, 0x0, 0xc84, 0x832}, 0x8) 07:20:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed={{}, [], {0x95, 0x70}}, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:51 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x5}, 0x40) 07:20:51 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000900)={'gre0\x00', &(0x7f0000000880)={'syztnl2\x00', 0x0, 0x0, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast1}}}}) [ 1449.485276][T12787] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1449.534389][T12791] loop4: detected capacity change from 264192 to 0 07:20:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:52 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) 07:20:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x6}, 0x40) 07:20:52 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1449.591665][ T35] audit: type=1800 audit(1611904852.037:2953): pid=12791 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=65 res=0 errno=0 07:20:52 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x22, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x7}, 0x40) 07:20:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x3) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, 0x0, 0x0) 07:20:52 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1449.992016][T12812] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x8}, 0x40) 07:20:52 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:52 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1450.215156][T12824] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1450.268592][T12826] loop4: detected capacity change from 264192 to 0 [ 1450.321771][T12831] loop0: detected capacity change from 264192 to 0 [ 1450.362504][ T35] audit: type=1800 audit(1611904852.807:2954): pid=12831 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=66 res=0 errno=0 07:20:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r2, r3, 0x0, 0x220fff) 07:20:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x9}, 0x40) 07:20:53 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:53 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1450.720942][T12843] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xa}, 0x40) 07:20:53 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:53 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:20:53 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) 07:20:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r2, r3, 0x0, 0x220fff) 07:20:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xb}, 0x40) [ 1451.010284][T12857] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1451.029207][T12853] loop4: detected capacity change from 264192 to 0 07:20:53 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1451.191346][T12871] loop5: detected capacity change from 264192 to 0 [ 1451.235820][T12875] loop0: detected capacity change from 264192 to 0 [ 1451.275320][ T35] audit: type=1800 audit(1611904853.727:2955): pid=12875 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=69 res=0 errno=0 07:20:53 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1451.375658][T12885] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1451.405331][ T35] audit: type=1800 audit(1611904853.817:2956): pid=12881 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=70 res=0 errno=0 07:20:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xc}, 0x40) 07:20:53 executing program 5: syz_usb_connect(0x3, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x6b, 0x93, 0x54, 0x10, 0xdf6, 0x21, 0x4c8d, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd6, 0xa9, 0x5b}}]}}]}}, &(0x7f00000009c0)={0x0, 0x0, 0xf, &(0x7f0000000500)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa}]}, 0x2, [{0x4, &(0x7f0000000580)=@lang_id={0x4}}, {0xa, &(0x7f0000000640)=@string={0xa, 0x3, "4ca925797ea681de"}}]}) 07:20:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000000440)=""/4097, 0x1001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) sendfile(r2, r3, 0x0, 0x220fff) 07:20:54 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:20:54 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xd}, 0x40) 07:20:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1451.823836][T12896] loop4: detected capacity change from 264192 to 0 07:20:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1451.906765][T12905] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1451.954793][T10886] usb 6-1: new high-speed USB device number 65 using dummy_hcd 07:20:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xe}, 0x40) 07:20:54 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:54 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r0, 0x0, &(0x7f0000000600)) io_cancel(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1452.112255][T12915] loop0: detected capacity change from 264192 to 0 [ 1452.194797][T10886] usb 6-1: Using ep0 maxpacket: 16 [ 1452.223115][ T35] audit: type=1800 audit(1611904854.667:2957): pid=12915 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=71 res=0 errno=0 [ 1452.275406][T12925] loop4: detected capacity change from 264192 to 0 [ 1452.281436][T12924] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xf}, 0x40) [ 1452.346444][ T35] audit: type=1800 audit(1611904854.787:2958): pid=12925 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=72 res=0 errno=0 07:20:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1452.515397][T10886] usb 6-1: New USB device found, idVendor=0df6, idProduct=0021, bcdDevice=4c.8d [ 1452.605247][T10886] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1452.793616][T10886] usb 6-1: Product: syz [ 1452.847756][T10886] usb 6-1: Manufacturer: ꥌ礥꙾ [ 1452.905741][T10886] usb 6-1: SerialNumber: syz [ 1452.980857][T10886] usb 6-1: config 0 descriptor?? [ 1453.334996][T10886] usb 6-1: Cannot read MAC address [ 1453.340619][T10886] MOSCHIP usb-ethernet driver: probe of 6-1:0.0 failed with error -71 [ 1453.396078][T10886] usb 6-1: USB disconnect, device number 65 [ 1454.044853][T10886] usb 6-1: new high-speed USB device number 66 using dummy_hcd [ 1454.294835][T10886] usb 6-1: Using ep0 maxpacket: 16 [ 1454.587172][T10886] usb 6-1: New USB device found, idVendor=0df6, idProduct=0021, bcdDevice=4c.8d [ 1454.605230][T10886] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1454.614421][T10886] usb 6-1: Product: syz [ 1454.642005][T10886] usb 6-1: Manufacturer: ꥌ礥꙾ [ 1454.649740][T10886] usb 6-1: SerialNumber: syz [ 1454.697740][T10886] usb 6-1: config 0 descriptor?? 07:20:57 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}) 07:20:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x10}, 0x40) 07:20:57 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:20:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(0x0, 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:57 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:57 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r0, 0x0, &(0x7f0000000600)) io_cancel(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1454.775007][T10886] usb 6-1: can't set config #0, error -71 [ 1454.792890][T10886] usb 6-1: USB disconnect, device number 66 [ 1454.868508][T12959] loop4: detected capacity change from 264192 to 0 [ 1454.911414][T12964] loop0: detected capacity change from 264192 to 0 [ 1454.913996][T12963] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1454.921744][ T35] audit: type=1800 audit(1611904857.367:2959): pid=12959 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=73 res=0 errno=0 07:20:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x11}, 0x40) 07:20:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(0x0, 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) [ 1455.343443][ T35] audit: type=1800 audit(1611904857.497:2960): pid=12968 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=74 res=0 errno=0 07:20:57 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x12}, 0x40) 07:20:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0x4, 0x4) 07:20:58 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r0, 0x0, &(0x7f0000000600)) io_cancel(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(0x0, 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:58 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) [ 1455.749708][T12984] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:58 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x13}, 0x40) 07:20:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000011c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16, @ANYBLOB="db"], 0x28}}, 0x0) [ 1455.898563][T12994] loop4: detected capacity change from 264192 to 0 07:20:58 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000002005600"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1456.010031][ T35] audit: type=1800 audit(1611904858.457:2961): pid=12994 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=75 res=0 errno=0 [ 1456.021715][T13008] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x14}, 0x40) [ 1456.076823][T13006] loop0: detected capacity change from 264192 to 0 [ 1456.105990][ T35] audit: type=1800 audit(1611904858.557:2962): pid=13006 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=76 res=0 errno=0 07:20:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:58 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x4001, 0x3, 0x310, 0x0, 0x0, 0x148, 0x160, 0x148, 0x278, 0x240, 0x240, 0x278, 0x240, 0x3, 0x0, {[{{@uncond, 0x0, 0x130, 0x160, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x23, 0x0, 0x0, 0x800, 0x7}}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv6=@empty, @ipv6=@private2, @ipv4, @ipv4=@local}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@unspec=@nfacct={{0x48, 'nfacct\x00'}, {'syz1\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x370) tkill(r1, 0x15) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 07:20:58 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1456.462467][T13017] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x15}, 0x40) 07:20:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:59 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000002005600"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1456.615670][T13023] xt_nfacct: accounting object `syz1' does not exists [ 1456.627757][T13024] loop4: detected capacity change from 264192 to 0 [ 1456.677970][ T35] audit: type=1800 audit(1611904859.127:2963): pid=13024 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=77 res=0 errno=0 [ 1456.930722][T13037] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:59 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) 07:20:59 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000002005600"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:20:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x16}, 0x40) 07:20:59 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:20:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1457.222464][T13044] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:20:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:20:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x17}, 0x40) [ 1457.309778][T13053] loop0: detected capacity change from 264192 to 0 [ 1457.390940][T13057] loop4: detected capacity change from 264192 to 0 [ 1457.428455][ T35] audit: type=1800 audit(1611904859.877:2964): pid=13057 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=78 res=0 errno=0 [ 1457.475473][ T35] audit: type=1800 audit(1611904859.927:2965): pid=13053 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=79 res=0 errno=0 07:21:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x23, 0x0, 0x0) 07:21:01 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x18}, 0x40) 07:21:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) 07:21:01 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:01 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) [ 1459.588510][T13081] loop0: detected capacity change from 264192 to 0 [ 1459.612892][T13085] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:21:02 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1459.671235][T13084] loop4: detected capacity change from 264192 to 0 07:21:02 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x19}, 0x40) [ 1459.711868][ T35] audit: type=1800 audit(1611904862.157:2966): pid=13090 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=80 res=0 errno=0 07:21:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r2, r4, 0x0, 0x220fff) [ 1459.943425][T13098] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:21:02 executing program 5: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000b00)={0x1}, &(0x7f0000000b40)={0x2}, &(0x7f0000000b80)={0x0, 0x989680}, &(0x7f0000000c00)={&(0x7f0000000bc0)={[0x1ffe00]}, 0x8}) 07:21:02 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, 0x0, 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:02 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1a}, 0x40) 07:21:02 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:02 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:02 executing program 5: socketpair(0x22, 0x0, 0x2, &(0x7f0000000380)) 07:21:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x0) sendfile(r2, r4, 0x0, 0x220fff) [ 1460.318553][T13113] loop4: detected capacity change from 264192 to 0 [ 1460.345198][T13114] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:21:02 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:02 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1b}, 0x40) 07:21:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x0) sendfile(r2, r4, 0x0, 0x220fff) 07:21:03 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1460.591618][T13126] loop0: detected capacity change from 264192 to 0 07:21:03 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) signalfd(0xffffffffffffffff, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1460.616934][T13128] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1460.747804][ T35] audit: type=1800 audit(1611904863.187:2967): pid=13135 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16362 res=0 errno=0 07:21:03 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, 0x0, 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:03 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1c}, 0x40) [ 1460.787224][T13138] loop5: detected capacity change from 264192 to 0 [ 1460.853130][ T35] audit: type=1800 audit(1611904863.297:2968): pid=13142 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16370 res=0 errno=0 07:21:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x0) sendfile(r2, r4, 0x0, 0x220fff) 07:21:03 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:03 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1460.957760][ T35] audit: type=1800 audit(1611904863.407:2969): pid=13142 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=81 res=0 errno=0 [ 1461.127054][T13151] loop4: detected capacity change from 264192 to 0 07:21:03 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1d}, 0x40) 07:21:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(0xffffffffffffffff) setresuid(0xee01, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000480)='ntfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000700)) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(0x0, &(0x7f0000000280)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 07:21:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(0xffffffffffffffff, r4, 0x0, 0x220fff) [ 1461.304424][T13158] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1461.349622][T13165] loop0: detected capacity change from 264192 to 0 [ 1461.382673][ T35] audit: type=1800 audit(1611904863.827:2970): pid=13165 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=82 res=0 errno=0 07:21:04 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:04 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, 0x0, 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(0xffffffffffffffff, r4, 0x0, 0x220fff) [ 1461.738098][T13174] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 07:21:04 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1e}, 0x40) [ 1461.869865][T13186] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1461.916388][T13188] loop4: detected capacity change from 264192 to 0 07:21:04 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:04 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:04 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x21}, 0x40) 07:21:04 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:04 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f0000000180)='./file0/file0\x00', 0x7, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e159c687a", 0x71, 0x0, 0x0, 0x1, r0}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(0xffffffffffffffff, r4, 0x0, 0x220fff) 07:21:04 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:04 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x22}, 0x40) [ 1462.309791][T13210] loop4: detected capacity change from 264192 to 0 [ 1462.356691][T13211] loop0: detected capacity change from 264192 to 0 [ 1462.397135][T13215] loop5: detected capacity change from 264192 to 0 07:21:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, 0xffffffffffffffff, 0x0, 0x220fff) 07:21:04 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1462.472674][ T35] audit: type=1800 audit(1611904864.917:2971): pid=13220 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16369 res=0 errno=0 07:21:05 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1462.809837][ T35] audit: type=1800 audit(1611904864.977:2972): pid=13215 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=83 res=0 errno=0 07:21:05 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x23}, 0x40) 07:21:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, 0xffffffffffffffff, 0x0, 0x220fff) 07:21:05 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x300}, 0x40) [ 1463.034550][T13237] loop0: detected capacity change from 264192 to 0 [ 1463.115276][T13245] loop4: detected capacity change from 264192 to 0 07:21:05 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f0000000180)='./file0/file0\x00', 0x7, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e159c687a", 0x71, 0x0, 0x0, 0x1, r0}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:05 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1463.181476][ T35] audit: type=1800 audit(1611904865.627:2973): pid=13237 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=84 res=0 errno=0 07:21:05 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x500}, 0x40) 07:21:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, 0xffffffffffffffff, 0x0, 0x220fff) 07:21:05 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1463.490605][T13264] loop0: detected capacity change from 264192 to 0 [ 1463.625371][T13277] loop4: detected capacity change from 264192 to 0 [ 1463.649911][ T35] audit: type=1800 audit(1611904866.097:2974): pid=13264 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=85 res=0 errno=0 [ 1463.731923][T13280] loop5: detected capacity change from 264192 to 0 07:21:06 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x600}, 0x40) 07:21:06 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1463.772491][ T35] audit: type=1800 audit(1611904866.217:2975): pid=13280 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=86 res=0 errno=0 07:21:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x0) 07:21:06 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f0000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:06 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:06 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x700}, 0x40) [ 1464.055918][T13293] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1464.331354][T13303] loop0: detected capacity change from 264192 to 0 07:21:07 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f0000000180)='./file0/file0\x00', 0x7, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e159c687a", 0x71, 0x0, 0x0, 0x1, r0}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:07 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x0) 07:21:07 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f0000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:07 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x900}, 0x40) 07:21:07 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1464.689148][T13318] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1464.704000][T13321] loop4: detected capacity change from 264192 to 0 07:21:07 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f0000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) read$midi(r3, &(0x7f0000000440)=""/4097, 0x1001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2008002) sendfile(r2, r4, 0x0, 0x0) [ 1464.842691][T13327] loop0: detected capacity change from 264192 to 0 07:21:07 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xa00}, 0x40) [ 1464.965630][T13332] loop5: detected capacity change from 264192 to 0 07:21:07 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:07 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8929, &(0x7f0000001900)={'team0\x00'}) [ 1465.390513][T13349] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:21:07 executing program 3: socketpair(0x18, 0x0, 0x0, &(0x7f0000000180)) 07:21:07 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xb00}, 0x40) [ 1465.546819][T13354] loop0: detected capacity change from 264192 to 0 07:21:08 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:08 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f00000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:08 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xc00}, 0x40) 07:21:08 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, 0x0) 07:21:08 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:08 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000140)={0x25, 0x78, 0x0, 0x0, 0x0, 0x1000000, 0x4, 0x0, {}, {}, {}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:21:08 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xd00}, 0x40) [ 1465.856095][T13368] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:21:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000001080)=@framed={{0x18, 0x7}}, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:08 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f00000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:08 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:08 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f00000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:08 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xe00}, 0x40) [ 1466.000017][T13380] loop0: detected capacity change from 264192 to 0 [ 1466.087146][T13389] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1466.091341][T13386] loop4: detected capacity change from 264192 to 0 [ 1466.227680][ T35] kauditd_printk_skb: 3 callbacks suppressed [ 1466.227697][ T35] audit: type=1800 audit(1611904868.677:2979): pid=13393 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16036 res=0 errno=0 [ 1466.413447][T13398] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1466.420654][T13400] loop0: detected capacity change from 264192 to 0 07:21:09 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x17, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1466.500027][ T35] audit: type=1800 audit(1611904868.947:2980): pid=13406 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=89 res=0 errno=0 07:21:09 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xf00}, 0x40) 07:21:09 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8911, &(0x7f0000001900)={'team0\x00'}) 07:21:09 executing program 5: socketpair(0x0, 0x858443ce257946d2, 0x0, 0x0) 07:21:09 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f00"/18, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1466.789535][T13412] loop4: detected capacity change from 264192 to 0 [ 1466.842621][ T35] audit: type=1800 audit(1611904869.287:2981): pid=13412 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=90 res=0 errno=0 [ 1466.881436][T13419] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:21:09 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f00"/18, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:09 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1100}, 0x40) 07:21:09 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d04, &(0x7f0000000080)) [ 1467.176845][T13425] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:21:09 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x1e, 0x3, &(0x7f0000001080)=@framed, &(0x7f0000001100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:09 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f00"/18, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:10 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:10 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1200}, 0x40) 07:21:10 executing program 5: clock_gettime(0x5, &(0x7f0000000200)) 07:21:10 executing program 3: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c0000000000000001"], 0x70}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1467.650513][T13438] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1467.661518][T13439] loop0: detected capacity change from 264192 to 0 07:21:10 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="2321202e2f66696c6530205b931dd094c1aa5443d95d1312f014d336b04b030400000000000092290a7e4555a763c1bfe2a08de276ed3ae7a2885e36b884bbcb3f50490f114d83c36515f936e1318eed5a4211763c064750c928f9e04681cfdd5a9b8b775bdbd501133566300f11b45b594a3ccce73bfa1b8b859ff73ac845e77253df938636bcbdeeef274aa294b9999e95c8c8ec26b78932d57aae34f30d6ab83ccccc98c7f4be21faeb127f0300000000000000abfcdf08c7cb96e8c156416cfc1b23c88af0143a2526937921d2e34496a0ca4d71227b362a942c59f08cd8e4ba8a46a6f6340a85d96c168e5f1201fe3f97c1bd3b8f845813c55433aeb54e163ce3e3211375672d79a0bcf0fef5a28cd0782fe4187c958a8a154e03e5dff816eb001fab34d5904f346ba64441d98e9de99f6b3069664ab79a1024ce9fac129416b568648fe476870e27d734ed3fe05f15384d0942f0f723c3de390a7a53ce5a4f2640f43ac6145b9ed02503225ff603715d9ce89da15c89af6b83a4b2439dce75db38f8d7a3961efe9a7fb3f7cbe85d6acb0eb8a4619effbaf4aedf28ca98540a3b66b4bfe020afaff82343e7e8179f763f268d555658db62a00389084b3580c9f961ec21147aed1d0bb9"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+'}, 0x16, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(r0, &(0x7f00000009c0), 0x2, &(0x7f0000000a00)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) close(r2) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='key_or_keyring:', &(0x7f0000000300)='\x00', &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f0000000880)='%\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:21:10 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1300}, 0x40) [ 1467.802024][ T35] audit: type=1800 audit(1611904870.247:2982): pid=13439 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=91 res=0 errno=0 07:21:10 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f0000000000000000000012", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1467.896903][T13452] loop3: detected capacity change from 140 to 0 [ 1467.977608][T13452] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (1) [ 1468.016934][T13458] loop4: detected capacity change from 264192 to 0 07:21:10 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1400}, 0x40) [ 1468.120657][T13464] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1468.238626][ T35] audit: type=1800 audit(1611904870.687:2983): pid=13458 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=92 res=0 errno=0 07:21:10 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000040)) 07:21:11 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:11 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f0000000000000000000012", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 07:21:11 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+'}, 0x16, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(r0, &(0x7f00000009c0), 0x2, &(0x7f0000000a00)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) close(r2) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='key_or_keyring:', &(0x7f0000000300)='\x00', &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f0000000880)='%\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:21:11 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:11 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1500}, 0x40) 07:21:11 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+'}, 0x16, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(r0, &(0x7f00000009c0), 0x2, &(0x7f0000000a00)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) close(r2) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='key_or_keyring:', &(0x7f0000000300)='\x00', &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f0000000880)='%\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) [ 1468.803100][T13484] loop0: detected capacity change from 264192 to 0 07:21:11 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f0000000000000000000012", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1468.963141][ T35] audit: type=1800 audit(1611904871.407:2984): pid=13491 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=93 res=0 errno=0 07:21:11 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000, 0x0) [ 1469.194900][T13499] __nla_validate_parse: 1 callbacks suppressed [ 1469.194918][T13499] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:21:11 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:11 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1600}, 0x40) [ 1469.399758][T13503] loop4: detected capacity change from 264192 to 0 [ 1469.424381][ T35] audit: type=1800 audit(1611904871.867:2985): pid=13503 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=94 res=0 errno=0 07:21:12 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+'}, 0x16, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(r0, &(0x7f00000009c0), 0x2, &(0x7f0000000a00)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) close(r2) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='key_or_keyring:', &(0x7f0000000300)='\x00', &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f0000000880)='%\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:21:12 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000, 0x0) 07:21:12 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+'}, 0x16, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(r0, &(0x7f00000009c0), 0x2, &(0x7f0000000a00)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) close(r2) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='key_or_keyring:', &(0x7f0000000300)='\x00', &(0x7f00000003c0)='/%\x1b!\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='@(@&\x00'], &(0x7f0000000940)=[&(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)='\xd0+^/-\xf2/\x00', &(0x7f0000000740)='trusted.overlay.nlink\x00', &(0x7f0000000780)='%\x00', &(0x7f00000007c0)='[^\x00', &(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)='\x00', &(0x7f0000000880)='%\x00', &(0x7f00000008c0)='}\x00', &(0x7f0000000900)='asymmetric\x00']) 07:21:12 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000, 0x0) 07:21:12 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1700}, 0x40) [ 1469.758479][T13514] loop0: detected capacity change from 264192 to 0 [ 1469.784289][ T35] audit: type=1800 audit(1611904872.227:2986): pid=13514 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=95 res=0 errno=0 07:21:12 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:12 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 07:21:12 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:12 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:12 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 07:21:12 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1800}, 0x40) 07:21:13 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="98", 0x1) 07:21:13 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:13 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) [ 1470.573513][T13543] loop0: detected capacity change from 264192 to 0 [ 1470.603152][ T35] audit: type=1800 audit(1611904873.047:2987): pid=13543 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=96 res=0 errno=0 07:21:13 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:13 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) [ 1470.767448][T13553] loop4: detected capacity change from 264192 to 0 07:21:13 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000001100)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, 0x0) [ 1470.873450][ T35] audit: type=1800 audit(1611904873.317:2988): pid=13560 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16379 res=0 errno=0 07:21:13 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:13 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1900}, 0x40) 07:21:13 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:13 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000300)) 07:21:13 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 07:21:13 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8971, &(0x7f0000001900)={'team0\x00'}) 07:21:13 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1a00}, 0x40) [ 1471.259568][T13577] loop4: detected capacity change from 264192 to 0 07:21:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4, @mcast1}}) 07:21:13 executing program 3: r0 = epoll_create(0x800) r1 = inotify_init() r2 = getpgid(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000040)={r0}) [ 1471.362772][ T35] audit: type=1800 audit(1611904873.807:2989): pid=13587 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16362 res=0 errno=0 07:21:13 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c00000024000b0f000000000000000000001200", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000200560001"], 0x8c}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 07:21:14 executing program 1: io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)="d8", 0xfffffffffffffdef}]) 07:21:14 executing program 5: clock_gettime(0x2, &(0x7f0000000380)) 07:21:14 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000880)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x10) 07:21:14 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1b00}, 0x40) 07:21:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1c00}, 0x40) [ 1471.810601][T13616] loop4: detected capacity change from 264192 to 0 07:21:14 executing program 5: write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000002040)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) getresuid(&(0x7f0000002100), &(0x7f0000002140), &(0x7f0000002180)) 07:21:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/194, 0x2f, 0xc2, 0x1}, 0x20) 07:21:14 executing program 1: semget(0x0, 0x671201f6d887edbe, 0x0) 07:21:14 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1471.928080][ T35] audit: type=1800 audit(1611904874.377:2990): pid=13616 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=97 res=0 errno=0 07:21:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1d00}, 0x40) 07:21:14 executing program 3: fsopen(&(0x7f0000000100)='tmpfs\x00', 0x0) 07:21:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="7a0a0000ff5ffe5f200000001000690095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:14 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:14 executing program 5: syz_open_dev$ttys(0xc, 0x2, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) 07:21:14 executing program 3: io_setup(0x5, &(0x7f0000000080)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000010dc0)='/dev/zero\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, &(0x7f00000000c0)}]) 07:21:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1e00}, 0x40) 07:21:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x12, 0x0, &(0x7f0000000140)) 07:21:14 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f00000024c0)=[{&(0x7f0000000440)="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", 0xffa, 0x6}], 0x0, 0x0) 07:21:14 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1472.282409][T13653] loop4: detected capacity change from 264192 to 0 07:21:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x5) 07:21:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1f00}, 0x40) [ 1472.412162][ T35] audit: type=1800 audit(1611904874.857:2991): pid=13653 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=98 res=0 errno=0 07:21:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x7, 0x0, &(0x7f0000000140)) 07:21:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x2000}, 0x40) [ 1472.477937][T13669] loop1: detected capacity change from 8 to 0 07:21:15 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1472.530469][T13675] loop0: detected capacity change from 264192 to 0 [ 1472.628804][ T35] audit: type=1800 audit(1611904875.077:2992): pid=13675 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16381 res=0 errno=0 07:21:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002080)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x0) 07:21:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1c, 0x0, &(0x7f0000000140)) 07:21:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/2756], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r4, 0x123, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 07:21:15 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x2100}, 0x40) 07:21:15 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1472.841519][T13693] loop4: detected capacity change from 264192 to 0 07:21:15 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x2200}, 0x40) [ 1472.923234][ T35] audit: type=1800 audit(1611904875.367:2993): pid=13693 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=99 res=0 errno=0 07:21:15 executing program 3: add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 07:21:15 executing program 5: socket$netlink(0x10, 0x3, 0x5) [ 1473.048681][T13709] loop0: detected capacity change from 264192 to 0 07:21:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/2756], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r4, 0x123, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 07:21:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x3938700}, 0x0, 0x0) 07:21:15 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1473.118405][ T35] audit: type=1800 audit(1611904875.567:2994): pid=13709 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16363 res=0 errno=0 07:21:15 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x2300}, 0x40) 07:21:15 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:15 executing program 5: io_setup(0x4, &(0x7f0000000000)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 07:21:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/2756], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r4, 0x123, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 1473.349797][T13729] loop4: detected capacity change from 264192 to 0 [ 1473.378775][ T35] audit: type=1800 audit(1611904875.827:2995): pid=13729 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=100 res=0 errno=0 07:21:15 executing program 3: r0 = semget$private(0x0, 0x2, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000021c0)={{0x2, 0xffffffffffffffff, 0xee01}}) [ 1473.460009][T13738] loop0: detected capacity change from 264192 to 0 [ 1473.486669][ T35] audit: type=1800 audit(1611904875.937:2996): pid=13738 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16380 res=0 errno=0 07:21:16 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/2756], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r4, 0x123, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 07:21:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1000000}, 0x40) 07:21:16 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x3f, 0x0, @loopback={0x0, 0x7}}, 0x1c, 0x0, 0x0, &(0x7f0000002500)=ANY=[@ANYBLOB="14000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) 07:21:16 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', 0x0, 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:16 executing program 5: socketpair(0x26, 0x5, 0x0, &(0x7f0000001400)) 07:21:16 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x519583, 0x0) [ 1473.826588][T13760] loop4: detected capacity change from 264192 to 0 07:21:16 executing program 5: socketpair(0x28, 0x0, 0xffff, &(0x7f0000000000)) 07:21:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x2000000}, 0x40) 07:21:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_deladdrlabel={0x1c, 0x49, 0xb}, 0x1c}}, 0x0) [ 1473.890256][T13762] loop0: detected capacity change from 264192 to 0 [ 1473.958365][ T35] audit: type=1800 audit(1611904876.406:2997): pid=13760 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=101 res=0 errno=0 07:21:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x3000000}, 0x40) 07:21:16 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000200)='\\', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, 0x0, 0x0) 07:21:16 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:16 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', 0x0, 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@flowinfo={{0x14, 0x11, 0x67}}], 0x18}, 0x0) 07:21:16 executing program 3: io_setup(0x7, &(0x7f0000000000)) 07:21:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="7a0a00ffff5ffe5f200000001000690095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1474.315234][T13794] loop0: detected capacity change from 264192 to 0 07:21:16 executing program 1: prctl$PR_SET_UNALIGN(0x22, 0x2) 07:21:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000140)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@dstopts={{0x18}}, @dstopts={{0x18}}], 0x30}, 0x0) 07:21:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x4000000}, 0x40) 07:21:16 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000001040)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:21:16 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', 0x0, 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1474.518547][T13807] loop4: detected capacity change from 264192 to 0 07:21:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x3f, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000002500)=ANY=[@ANYBLOB="18000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) [ 1474.635536][ T35] audit: type=1800 audit(1611904877.086:2998): pid=13807 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=102 res=0 errno=0 07:21:17 executing program 1: io_setup(0x5, &(0x7f0000000080)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000010dc0)='/dev/zero\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x8000000000000000}]) [ 1474.727974][T13823] loop0: detected capacity change from 264192 to 0 07:21:17 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:17 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x6, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 07:21:17 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x5000000}, 0x40) 07:21:17 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) 07:21:17 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="32a6d42c88634b2623028769af4c7453", 0x10) [ 1475.001632][T13842] loop4: detected capacity change from 264192 to 0 07:21:17 executing program 1: mlock2(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x14) [ 1475.072566][T13851] FAT-fs (loop0): bogus number of reserved sectors [ 1475.090287][T13851] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:17 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040000c000000", 0x24, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0xf02, 0x2000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af30100040000000000000000000000010000001000", 0x3e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0, 0x0, 0x10000}, {&(0x7f0000013900)="111fc0d901000000803a0900803a", 0xe, 0x30000}, {0x0}, {&(0x7f0000000880)="2719c0d90100000080", 0x9, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x200) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000640)=""/231, 0xe7) 07:21:17 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x6000000}, 0x40) 07:21:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000001c0)={0x6, {{0x2, 0x0, @empty}}}, 0x88) 07:21:17 executing program 5: getgroups(0x1, &(0x7f0000002340)=[0x0]) 07:21:17 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:17 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1475.279592][T13863] loop1: detected capacity change from 4096 to 0 07:21:17 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x7000000}, 0x40) [ 1475.349706][T13863] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 07:21:17 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x1, @dev}, 0x1c, {0x2, 0x0, @multicast2}, 'team_slave_1\x00'}) 07:21:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x3f, 0x0, @loopback}, 0x1c, &(0x7f0000002440)=[{0x0, 0x7}, {&(0x7f0000000100)="fa", 0x1}], 0x2, &(0x7f0000002500)=ANY=[@ANYBLOB="14000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) 07:21:17 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 1475.454430][T13879] loop4: detected capacity change from 264192 to 0 07:21:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x5, 0x0, &(0x7f0000000180)) 07:21:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x8000000}, 0x40) 07:21:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x20, 0x703, 0x45, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, [], 0x25}, 0x80, 0x20, 0xfff, 0xe0ca}}) r2 = msgget$private(0x0, 0x16d) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'sit0\x00', r1, 0x4, 0x6, 0x43, 0x9, 0x8, @empty, @private1={0xfc, 0x1, [], 0x1}, 0x1, 0x7, 0xffffffc1}}) msgrcv(r2, &(0x7f0000000000)={0x0, ""/209}, 0xd9, 0x1, 0x2000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'ip6_vti0\x00', r1, 0x2f, 0x20, 0x8, 0x2, 0x12, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00', 0x700, 0x40, 0x9, 0xfff}}) [ 1475.683484][T13891] FAT-fs (loop0): bogus number of reserved sectors 07:21:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x9000000}, 0x40) [ 1475.725747][T13891] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x19) 07:21:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x3) 07:21:18 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:18 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x2, &(0x7f0000000000)=@raw=[@initr0], &(0x7f0000000280)='syzkaller\x00', 0x5, 0xa4, &(0x7f0000000140)=""/164, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xa000000}, 0x40) 07:21:18 executing program 1: mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x1) shmat(0x0, &(0x7f0000ff8000/0x1000)=nil, 0x4000) [ 1476.104795][T13922] FAT-fs (loop0): bogus number of reserved sectors [ 1476.111386][T13922] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:18 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) [ 1476.197953][T13930] loop4: detected capacity change from 264192 to 0 07:21:18 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xb000000}, 0x40) 07:21:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, r0) 07:21:19 executing program 5: r0 = mq_open(&(0x7f00000000c0)='.\x92', 0x0, 0x0, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) 07:21:19 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x428, 0x210, 0x210, 0x428, 0x338, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, 0x0, {[{{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@ipv4={[], [], @dev}, @ipv6=@mcast1}}}, {{@ipv6={@mcast2, @private0, [], [], 'macvlan0\x00', 'vxcan1\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @inet=@TOS={0x28, 'TOS\x00'}}, {{@ipv6={@local, @private1, [], [], 'wg1\x00', 'wg0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@hl={{0x28, 'hl\x00'}}]}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast1, @ipv6=@dev}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x628) 07:21:19 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:19 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xc000000}, 0x40) 07:21:19 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) 07:21:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xd000000}, 0x40) 07:21:19 executing program 1: r0 = getpgid(0x0) r1 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x5, 0xffffffffffffffff, 0x0) 07:21:19 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1476.850413][T13975] loop4: detected capacity change from 264192 to 0 07:21:19 executing program 1: syz_mount_image$vfat(&(0x7f00000007c0)='vfat\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x3010, &(0x7f0000000a80)) 07:21:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x1b, 0x0, &(0x7f0000000180)) 07:21:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xe000000}, 0x40) [ 1476.978476][ T35] kauditd_printk_skb: 4 callbacks suppressed [ 1476.978492][ T35] audit: type=1800 audit(1611904879.426:3003): pid=13975 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=106 res=0 errno=0 07:21:19 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x6001, 0x0) 07:21:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0xf000000}, 0x40) 07:21:19 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x0, 0x1000000000000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) 07:21:19 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000033700)={0x0, 0x0, 0x0}, 0x2101) 07:21:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x3f, 0x0, @loopback={0x0, 0x301}}, 0x1c, 0x0, 0x0, &(0x7f0000002500)=ANY=[@ANYBLOB="14000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) 07:21:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x10000000}, 0x40) 07:21:20 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x11000000}, 0x40) [ 1477.607339][T14023] loop0: detected capacity change from 264192 to 0 [ 1477.655775][T14029] loop4: detected capacity change from 264192 to 0 [ 1477.664183][T14023] FAT-fs (loop0): bogus number of reserved sectors [ 1477.674829][T14023] FAT-fs (loop0): Can't find a valid FAT filesystem [ 1477.693732][ T35] audit: type=1800 audit(1611904880.136:3004): pid=14029 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=107 res=0 errno=0 [ 1477.760480][ T35] audit: type=1800 audit(1611904880.186:3005): pid=14038 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16380 res=0 errno=0 07:21:20 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x12000000}, 0x40) 07:21:20 executing program 3: semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)=0x4) io_setup(0x0, &(0x7f0000000000)) 07:21:20 executing program 1: shmctl$IPC_SET(0x0, 0x2, &(0x7f00000001c0)={{0x2, 0xee01, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 07:21:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x3f, 0x0, @loopback={0x0, 0x301}}, 0x1c, 0x0, 0x0, &(0x7f0000002500)=ANY=[@ANYBLOB="14000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) 07:21:20 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:20 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:20 executing program 1: io_setup(0x0, &(0x7f00000301c0)) 07:21:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002740)={&(0x7f0000000000)=@proc, 0xc, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000002640)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x10}}], 0x30}, 0x0) 07:21:20 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x13000000}, 0x40) 07:21:20 executing program 1: r0 = epoll_create(0x800) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) r2 = inotify_init() epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r2) [ 1478.123056][T14064] loop0: detected capacity change from 264192 to 0 07:21:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x3f, 0x0, @loopback={0x0, 0x301}}, 0x1c, 0x0, 0x0, &(0x7f0000002500)=ANY=[@ANYBLOB="14000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) [ 1478.222418][T14067] loop4: detected capacity change from 264192 to 0 [ 1478.246538][T14064] FAT-fs (loop0): bogus number of reserved sectors [ 1478.257914][ T35] audit: type=1800 audit(1611904880.706:3006): pid=14072 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16275 res=0 errno=0 [ 1478.275124][T14064] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x3f, 0x0, @loopback}, 0x1c, &(0x7f0000002440)=[{0x0}, {&(0x7f00000001c0)='v', 0x1}], 0x2, &(0x7f0000002500)=ANY=[@ANYBLOB="14000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) 07:21:20 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x14000000}, 0x40) 07:21:20 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/2756], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) 07:21:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x3f, 0x0, @loopback={0x0, 0x301}}, 0x1c, 0x0, 0x0, &(0x7f0000002500)=ANY=[@ANYBLOB="14000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) 07:21:21 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002080)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000044c0)=[{0x0, 0x0, &(0x7f0000000000), 0x3f}, {&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="6d776a42e75cfd48a5802c1ea37df1f3f9d45fb5262bf8af7735dbdce0c66e7c80d6459ac9ac635585e96f486465b30955e07540ac1bec462860cf304c0b8119c1aea353839520e10973f05da4b37e4e92fbd53813"}], 0x0, &(0x7f0000000280)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x0, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x0, 0x1, 0x2, {0x0, 0xee00}}}]}, {&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="401810adbf69836cbba1abfd815f4cc7246d82add912387f7bb02866236eb37e42b5236ad26ef61e7dd59f73eb930dfaa28ffcbe8ccb8e2f45d7394715138f031ff25351"}], 0x0, &(0x7f0000000740)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @cred]}, {&(0x7f0000000800)=@abs, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)="e3025f904e3d2d3f819aa6d81cce846139a91a0401365eb9d8e317a748d4a2c1c6e4a5acba6b3efede0e04ddcb05c7f3461054cd37b807516dc78876582a1cb6928a81d3941a54534e6bdf91877f1ae4942834b8e71c88cbf448c49b5102cb86a36f3fa1543a79ac7d3f988af19ba6204c8dd280d08d766a"}, {&(0x7f0000000900)="64c614a39afdd7179014eebc66431e53e79e768d8a004c27"}, {&(0x7f0000000f00)="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"}], 0x0, &(0x7f0000000c00)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}]}, {&(0x7f0000000d40)=@abs, 0x0, &(0x7f0000004200)=[{&(0x7f0000000dc0)="0df192cb6dc9bc6fd3ee883f54c2653b14c733b954c153639c1e72beee8d298abc911965ce2da3d12e65d3e31334a4e209a7f122a342e1873294683bf332c04a6fbb9ba0daf7758eca0bed7e2a5d4bd44d5fc8e34298b05461726e3fa04ae8d8e0264e75c740b1da0a7321af2c4a05aa533e923af5983306aa54cf4b0ad06559cdc7ab5fcb9e7c462aee66f882ea13b86868ffa51ffc7a7c81bb5b46ec7c5434a15680a920399a62a877862bba7e1814eaed62948302"}, {&(0x7f0000001f00)="de5422c55327110471297cdc05bbcd2fa10c45d2e0769bf59490f0a8e56216e817fe9ddcfe7f09f4d2"}, {&(0x7f0000001f40)="e980f18c387652215898c0695251add10ea9d174392ef939b1f9adbee7cce64900069644770f185d493269751d94ec7f0b01b1635a98fc91067dc8fa86f2f487732aeabff6cd72ea040992c8f3766640d41d65423ac3a6a1bd5534f7f0924304c8beaf84565ff0e9f07212865eb4eacd04f5811b4d6419ebc502421dc1c6b35a918519e6f85504f32614d703d30e8fe5d145bfd2c5723e5cb409e49bf48f89791f465bb771b8accacaa643bd60cc42f2724a925f04c70fe5b679e7e17f87a7ff"}, {&(0x7f0000004100)="b30a9c6a4d466df848d45942781f20c47b7dd9f00e3a3e094bac09ed6ccc5091290bc3d1cdf21333c1b33f75d36e99590419897e87dd9631548e9fecc2b651be5b12331c1003aef4aa13ac0b2daacabc471a95352e280ed1e34ccf2b244e73346bd90e6ec7634a68b111b659b2d9f71f260dd98efc3930c137663670318befdcd169a1cbe3383dce28148ad4d848df81df4c3780a58bfda0bfa87488994203da7a28e1192241d70333a4c3a51b2480860c8bbd830382a77f04182a21b48a73c970a48cb9dc5000160a507b1b75aef5223859b644911db0d1691d39ddbd89a27325a5a985720096138b"}, {&(0x7f0000002000)="cc5ba778f01fadacde8a1515ff5901a6396700159e4c82f26c308bc747aa62c93fb036ca5b214a3db5351f4e1e974a20822a"}, {&(0x7f000000a7c0)="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"}], 0x0, &(0x7f0000004400)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @cred, @cred]}], 0x1, 0x0) [ 1478.701959][T14095] loop4: detected capacity change from 264192 to 0 07:21:21 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x15000000}, 0x40) 07:21:21 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040000c000000", 0x24, 0x4e0}, {&(0x7f0000000080)="030000000400", 0x6, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0xf00, 0x2000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af30100040000000000000000000000010000001000", 0x3e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a", 0xe, 0x30000}, {0x0}, {&(0x7f0000000880)="2719c0d901000000", 0x8, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x200) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000640)=""/231, 0xe7) [ 1478.751217][ T35] audit: type=1800 audit(1611904881.196:3007): pid=14095 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=108 res=0 errno=0 [ 1478.768512][T14108] loop0: detected capacity change from 264192 to 0 [ 1478.784209][T14108] FAT-fs (loop0): bogus number of reserved sectors [ 1478.792759][T14108] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/2756], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) 07:21:21 executing program 5: io_setup(0x5, &(0x7f0000000080)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000010dc0)='/dev/zero\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000000c0)="d8", 0xfffffdfc}]) [ 1479.007045][T14120] loop1: detected capacity change from 4096 to 0 07:21:21 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1479.146160][T14120] loop1: detected capacity change from 4096 to 0 07:21:21 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:21 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x16000000}, 0x40) [ 1479.223531][T14120] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 1479.243157][T14120] EXT4-fs warning (device loop1): ext4_enable_quotas:6433: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1479.292743][T14120] EXT4-fs (loop1): mount failed 07:21:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/2756], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) [ 1479.389724][T14139] loop0: detected capacity change from 264192 to 0 07:21:21 executing program 1: shmat(0x0, &(0x7f0000ffb000/0x3000)=nil, 0x5000) [ 1479.468803][T14139] FAT-fs (loop0): bogus number of reserved sectors [ 1479.522119][ T35] audit: type=1800 audit(1611904881.966:3008): pid=14145 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16374 res=0 errno=0 07:21:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000002100)={'batadv_slave_0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x207f, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xb, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:22 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x17000000}, 0x40) [ 1479.572504][T14139] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/2756], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) 07:21:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000046c0)=[{0x0, 0x0, &(0x7f00000022c0)=[{0x0, 0x7ffff000}, {&(0x7f00000021c0)='D', 0x1}], 0x2}], 0x1, 0x0) [ 1479.731854][T14149] loop4: detected capacity change from 264192 to 0 07:21:22 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:22 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, 0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:22 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:21:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:22 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x18000000}, 0x40) 07:21:22 executing program 3: io_setup(0x5, &(0x7f0000000080)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000010dc0)='/dev/zero\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 1479.979689][T14176] loop0: detected capacity change from 264192 to 0 [ 1480.060216][T14179] loop4: detected capacity change from 264192 to 0 [ 1480.078889][T14176] FAT-fs (loop0): bogus number of reserved sectors [ 1480.089598][ T35] audit: type=1800 audit(1611904882.536:3009): pid=14179 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=109 res=0 errno=0 07:21:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 07:21:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1480.166731][T14176] FAT-fs (loop0): Can't find a valid FAT filesystem [ 1480.177943][ T35] audit: type=1800 audit(1611904882.556:3010): pid=14186 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16381 res=0 errno=0 07:21:22 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x19000000}, 0x40) 07:21:22 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:22 executing program 3: clone(0x81000, 0x0, 0x0, 0x0, 0x0) 07:21:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x3f, 0x0, @loopback}, 0x1c, &(0x7f0000002440)=[{0x0, 0x8}, {&(0x7f0000000100)="fa", 0x1}], 0x2, &(0x7f0000002500)=ANY=[@ANYBLOB="14000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) 07:21:22 executing program 1: semtimedop(0x0, &(0x7f0000000100)=[{}], 0x1, 0x0) [ 1480.597430][T14212] loop0: detected capacity change from 264192 to 0 07:21:23 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, 0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:23 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1a000000}, 0x40) [ 1480.683638][T14212] FAT-fs (loop0): bogus number of reserved sectors [ 1480.696605][ T35] audit: type=1800 audit(1611904883.146:3011): pid=14218 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15857 res=0 errno=0 07:21:23 executing program 1: prctl$PR_SET_UNALIGN(0xd, 0x0) 07:21:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) [ 1480.742383][T14212] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:23 executing program 3: r0 = getpgrp(0xffffffffffffffff) sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x5) 07:21:23 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1b000000}, 0x40) 07:21:23 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1480.924653][T14230] loop4: detected capacity change from 264192 to 0 07:21:23 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000140)=""/185) 07:21:23 executing program 5: socket(0x0, 0x8080e, 0x0) 07:21:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000100), 0x0, 0x0) 07:21:23 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1c000000}, 0x40) [ 1481.108177][T14240] loop0: detected capacity change from 264192 to 0 07:21:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000010dc0)='/dev/zero\x00', 0x224040, 0x0) ppoll(&(0x7f0000011300)=[{r0}], 0x1, 0x0, &(0x7f0000011380)={[0x5]}, 0x8) 07:21:23 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, 0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:23 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) 07:21:23 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1d000000}, 0x40) [ 1481.486988][T14266] loop0: detected capacity change from 264192 to 0 07:21:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000040)={'ip6gre0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000013c0)={'syztnl2\x00', &(0x7f0000001340)={'ip6_vti0\x00', 0x0, 0x2f, 0x8, 0x0, 0x6, 0x34, @loopback, @empty, 0x20, 0x1, 0x7, 0xfffffabe}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r4, 0x89fa, &(0x7f00000006c0)={'ip6gre0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000001540)={'ip6tnl0\x00', &(0x7f00000014c0)={'syztnl2\x00', r2, 0x29, 0xe3, 0x7, 0x5d0d, 0x11, @local, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1, 0x40, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f0000001480)={'ip6tnl0\x00', &(0x7f0000001400)={'ip6tnl0\x00', r2, 0x4, 0x2, 0x5, 0x3ff, 0x8, @ipv4={[], [], @loopback}, @mcast2, 0x8, 0x8000, 0x2, 0x10001}}) r5 = socket$inet6(0xa, 0x2, 0x200) sendto(r5, &(0x7f0000000200)="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", 0x1000, 0x0, &(0x7f0000001200)=@ethernet={0x6}, 0x80) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x8910, &(0x7f0000000000)={'syztnl1\x00', 0x0}) r6 = accept4(r5, &(0x7f0000000080)=@vsock, &(0x7f0000000100)=0x80, 0x800) getpeername(r6, &(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000001c0)=0x80) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000001300)={'syztnl1\x00', &(0x7f0000001280)={'syztnl2\x00', 0x0, 0x4, 0x9, 0x40, 0x8000, 0x10, @loopback, @mcast2, 0x40, 0x7, 0x0, 0x99e}}) 07:21:24 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1e000000}, 0x40) [ 1481.535462][T14269] loop4: detected capacity change from 264192 to 0 [ 1481.579090][T14270] FAT-fs (loop5): bogus number of reserved sectors [ 1481.610333][T14266] FAT-fs (loop0): bogus number of reserved sectors [ 1481.662000][T14270] FAT-fs (loop5): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 1481.700128][T14266] FAT-fs (loop0): Can't find a valid FAT filesystem [ 1481.742209][T14270] FAT-fs (loop5): Can't find a valid FAT filesystem 07:21:24 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:24 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x1f000000}, 0x40) [ 1481.892955][T14270] FAT-fs (loop5): bogus number of reserved sectors 07:21:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000002100)={'batadv_slave_0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x207f, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1481.993005][T14270] FAT-fs (loop5): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 1482.017723][T14270] FAT-fs (loop5): Can't find a valid FAT filesystem 07:21:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0xe0003, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 07:21:24 executing program 1: prctl$PR_SET_UNALIGN(0x8, 0x1) [ 1482.261098][T14305] loop0: detected capacity change from 264192 to 0 [ 1482.283203][T14305] FAT-fs (loop0): bogus number of reserved sectors [ 1482.290616][T14305] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:24 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x20000000}, 0x40) 07:21:24 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:24 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:24 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="7a000000ff5ffe5f200000001000690095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x3f, 0x0, @loopback}, 0x1c, &(0x7f0000002440)=[{&(0x7f0000000080)="c3", 0x1}, {&(0x7f00000001c0)='v', 0x1}, {&(0x7f0000000280)="d6", 0x1}], 0x3, &(0x7f0000002500)=ANY=[@ANYBLOB="14000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) 07:21:24 executing program 1: lstat(&(0x7f00000021c0)='./file0\x00', 0x0) lstat(&(0x7f00000029c0)='./file0\x00', 0x0) 07:21:24 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x21000000}, 0x40) 07:21:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000010e00)='/dev/zero\x00', 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 07:21:25 executing program 5: mq_open(&(0x7f00000000c0)='.\x92', 0x0, 0x0, &(0x7f0000000100)) [ 1482.647722][T14335] loop4: detected capacity change from 264192 to 0 [ 1482.681344][T14339] loop0: detected capacity change from 264192 to 0 07:21:25 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x22000000}, 0x40) [ 1482.738661][ T35] kauditd_printk_skb: 3 callbacks suppressed [ 1482.738677][ T35] audit: type=1800 audit(1611904885.186:3015): pid=14335 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=112 res=0 errno=0 [ 1482.802621][T14339] FAT-fs (loop0): bogus number of reserved sectors 07:21:25 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001580)='/dev/vsock\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0xf3000310) [ 1482.873636][ T35] audit: type=1800 audit(1611904885.226:3016): pid=14348 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16379 res=0 errno=0 [ 1482.949308][T14339] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:25 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000010dc0)='/dev/zero\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 07:21:25 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1, 0x23000000}, 0x40) 07:21:26 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:26 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x66000, 0x0) 07:21:26 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:26 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x113240, 0x0) 07:21:26 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, "4232fc07d07cf6ebf3eccab687600a7e268dce"}) 07:21:26 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1}, 0x8) 07:21:26 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1}, 0x78) [ 1483.766115][T14374] loop0: detected capacity change from 264192 to 0 07:21:26 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000010e00)='/dev/zero\x00', 0x0, 0x0) 07:21:26 executing program 1: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x41028, &(0x7f0000000300)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}}) [ 1483.827435][T14382] loop4: detected capacity change from 264192 to 0 [ 1483.835257][T14374] FAT-fs (loop0): bogus number of reserved sectors [ 1483.842143][T14374] FAT-fs (loop0): Can't find a valid FAT filesystem [ 1483.912108][ T35] audit: type=1800 audit(1611904886.356:3017): pid=14374 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16368 res=0 errno=0 [ 1483.992216][ T35] audit: type=1800 audit(1611904886.386:3018): pid=14385 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16374 res=0 errno=0 07:21:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x8}, 0x0) 07:21:26 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:26 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000010e00)='/dev/zero\x00', 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 07:21:26 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:26 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='\'', 0x1, r0) 07:21:26 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1}, 0x20000100) 07:21:26 executing program 5: fsopen(&(0x7f0000000080)='fusectl\x00', 0x0) [ 1484.378248][T14398] loop0: detected capacity change from 264192 to 0 07:21:26 executing program 5: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)=')', 0x20000181, 0xfffffffffffffffc) 07:21:26 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 07:21:27 executing program 1: add_key(&(0x7f0000000140)='asymmetric\x00', 0x0, &(0x7f00000000c0)="1048", 0x2, 0xfffffffffffffffe) [ 1484.515760][T14409] loop4: detected capacity change from 264192 to 0 [ 1484.539519][T14398] FAT-fs (loop0): bogus number of reserved sectors 07:21:27 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = signalfd(r0, &(0x7f0000000040)={[0x5]}, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) splice(r2, 0x0, r3, 0x0, 0x4ffe0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r4, 0x0, 0x1}, 0x40) [ 1484.553377][ T35] audit: type=1800 audit(1611904886.996:3019): pid=14408 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15762 res=0 errno=0 [ 1484.595463][T14398] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2c00) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000009c0)=[{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000006c0)="9b3f5b1972d18a40d43f3dd87a1fdf23e3fc5592426aa0efed9b16597f5f79c16d02746581efad5de56120f6eda29fd62801be94f6b1f434ef266d", 0xfffffc48}, {&(0x7f0000000700)="20e57d430d4a64fdd828ed5f5b6d0b8555b1ec22e86ba99c94e8c723ba8de13a63bcc4460a8a4184fb4b7543522be0f21c1291a1dbeeed2f2498eacecae04e79ba6b6e4fa4a787b58971a1efb37d455934ffb1adc8991c0fc02b6e63db7b8d5a13c8a300fd0b535884777ebbba15310e4111f16946a35999156381d98fd7ed1d6fdae3a543a2ceffb08d9116163f44b2494198b006f3f69d6810b3b644cb983a7be814783f6d85a1bac9b76662c5d29a61303375bf8be874fe9316870d597a28f1801d", 0xc3}, {&(0x7f0000000800)="053edb9fe43903b6f805261c47a0", 0xe}], 0x3, &(0x7f0000000a00)=ANY=[@ANYRES32], 0x140}], 0x1, 0x0) 07:21:27 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1484.703776][ T35] audit: type=1800 audit(1611904887.116:3020): pid=14409 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=113 res=0 errno=0 07:21:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 07:21:27 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r0, 0xffffffffffffffff, 0x9, 0x0) [ 1485.063897][T14437] loop0: detected capacity change from 264192 to 0 [ 1485.144287][T14437] FAT-fs (loop0): invalid media value (0x00) [ 1485.200700][ T35] audit: type=1800 audit(1611904887.646:3021): pid=14444 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16367 res=0 errno=0 [ 1485.234439][T14437] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:27 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, 0x0) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0x9, 0x1, [{0x0, 0x3, '+'}]}]}}}], 0x20}, 0x0) 07:21:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x4010111, r0, 0x0) 07:21:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(0x0, 0x5, 0x0) ptrace$getregs(0xe, r0, 0xfffffffffffffbff, &(0x7f0000000180)=""/207) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x2201, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fde000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000440)="f08341a800640f01ca650f30bad104edf2f2c0c32cbaa00066b81b07350066efb849000f00d066b8a85c00000f23c80f21f86635080000000f23f8c18f810000360f01c9", 0x44}], 0x1, 0x0, &(0x7f00000004c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_open_procfs(0x0, 0x0) 07:21:27 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x4, &(0x7f0000000180)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x31}]}, &(0x7f00000001c0)='syzkaller\x00', 0x5, 0x84, &(0x7f0000001280)=""/132, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1485.512731][T14457] loop0: detected capacity change from 264192 to 0 07:21:28 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x210, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x5}, 0x40) socket$kcm(0x29, 0x2, 0x0) [ 1485.596171][ T35] audit: type=1800 audit(1611904888.046:3022): pid=14464 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16383 res=0 errno=0 [ 1485.602377][T14457] FAT-fs (loop0): invalid media value (0x00) 07:21:28 executing program 1: prctl$PR_SET_UNALIGN(0x4, 0x407500) [ 1485.661603][T14457] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:28 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1485.806453][T14481] loop4: detected capacity change from 264192 to 0 07:21:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0x28, &(0x7f00000003c0)="292366f045a2d7d5d04437efd6b902e1f82798763e13db3d9bddce1aa78c5fe58161a46a87211384"}) 07:21:28 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000a86a2cceb3bb52b57e9f000005a9c379be34adf9073fa20000000000000000"], &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1}, 0x40) 07:21:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x2, 0x0, &(0x7f0000000140)) [ 1485.887181][ T35] audit: type=1800 audit(1611904888.336:3023): pid=14481 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=114 res=0 errno=0 [ 1486.103299][T14492] loop0: detected capacity change from 264192 to 0 07:21:29 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x6}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:29 executing program 1: prctl$PR_SET_UNALIGN(0x27, 0x407500) 07:21:29 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:29 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x14}, 0xc) 07:21:29 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, 0x0) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) 07:21:29 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018b7e879b00000000ce0a4000c0000000200000000000000000000040000000000003b6dc035c64a274dca608dc6"], &(0x7f0000000080)=""/236, 0x26, 0xec, 0x7}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r1, 0x0, 0x1}, 0x40) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket(0x10, 0x3, 0x0) splice(r3, 0x0, r4, 0x0, 0x4ffe0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000780)={0xffffffffffffffff, 0x9, 0x800, 0x8000}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000440)={&(0x7f0000000180)="f65bcbd8fdbf6258689d010669896cc266edf44f060cd44d8de3107ddf889036be49fd019ba17b33a2e05a78b5d3ee06eddac1700417bab3844c52f5ac6e10b3c7084e9fc1c84b86", &(0x7f0000000240)=""/92, &(0x7f00000002c0)="c12c782e4425de8f665e96a942f388a4881515572c4667f299900b742ef9ea207e1f8d573b6cb44b3c295b797803ad547b2947849fd8075ffb46be05cddbb29eef94ca3bbcb0bcf6eeef1ce58933fcdf039b3ae1815d4554c7f8fafccc11d01b0ac0dfc2cb716cf410074bda5a261d3389ba36c6285c47b30682268d54497c5fb3cd96b4014e09aec7796a34eaf6531be8cdffa6983dacf14c30b5e614c0f451d06c106dbbf18dc95fd07c50e94312713e5a40850552053bda600b755f7b04dc83d55aeef881f4af2b01cd3245885ebdb505bafb812b61cd349115959c2c13cc3714", &(0x7f00000003c0)="08b0b69d842783bc37e704deaaa2e09f4e12ffe8b699e57121e5a1e249a1db1e9fc4654132f2a95e5a16ad4a401fc0771ed8c9588baa848c908fc9205c7f8e6ca0714efb5ab6508d75e7085303d17b45d5d40a674a78", 0x6, r2, 0x4}, 0x38) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fsmount(r6, 0x1, 0xf6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xd, 0xd, &(0x7f00000004c0)=@raw=[@map={0x18, 0x4, 0x1, 0x0, r7}, @generic={0x80, 0x3, 0x8, 0x9, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x5f}, @alu={0x7, 0x1, 0x1, 0xc, 0x1, 0x4, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3b}, @ldst={0x0, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffffc, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x7, 0x1, 0x8, 0xa, 0x6, 0xfffffffffffffff4, 0x1}], &(0x7f0000000540)='syzkaller\x00', 0x7, 0xef, &(0x7f0000000580)=""/239, 0x41000, 0x0, [], 0x0, 0x23, r9, 0x8, &(0x7f0000000680)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x1, 0xd, 0x800, 0xffff}, 0x10, 0x0, r6}, 0x78) r10 = socket(0x10, 0x3, 0x0) splice(r5, 0x0, r10, 0x0, 0x4ffe0, 0x0) ioctl$KVM_GET_MP_STATE(r5, 0x8004ae98, &(0x7f0000000480)) close(0xffffffffffffffff) 07:21:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000800)={'tunl0\x00', &(0x7f0000000740)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}}}}) 07:21:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x3f, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000002500)=ANY=[@ANYBLOB="14000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) [ 1486.836594][T14512] loop0: detected capacity change from 264192 to 0 [ 1486.956432][T14524] loop4: detected capacity change from 264192 to 0 07:21:29 executing program 3: io_setup(0x10000, &(0x7f00000301c0)=0x0) io_cancel(r0, &(0x7f0000030300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, 0x2}, 0x0) io_setup(0xb94, &(0x7f0000000080)) 07:21:29 executing program 5: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000e4ff280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000013c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x4}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x48, 0x2, [@TCA_ROUTE4_POLICE={0x4}, @TCA_ROUTE4_POLICE={0x40, 0x5, [@TCA_POLICE_TBF={0x3c}]}]}}]}, 0x78}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 07:21:29 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) [ 1487.001034][ T35] audit: type=1800 audit(1611904889.446:3024): pid=14524 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=115 res=0 errno=0 07:21:29 executing program 1: mq_open(&(0x7f00000000c0)='.\x92', 0x40, 0x0, &(0x7f0000000100)={0xf919, 0xcf, 0x977a, 0x1}) [ 1487.251954][T14536] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1487.311002][T14538] loop0: detected capacity change from 264192 to 0 [ 1487.412205][T14538] FAT-fs (loop0): invalid media value (0x00) 07:21:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000100)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) [ 1487.507485][T14538] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:30 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:30 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) 07:21:30 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) signalfd(r0, &(0x7f0000000300), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x14d7c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x0, 0x0) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="1f9bbb9cc6e696a6ef03b4c0f9b9c4f93a7703b234a8d0fabc098b50e5b40275fbde297bf947939a73f633464f0ec7e9adb25f9e8cf38e4a75307f92d804701ff7b84b777a1e4f1ca4ac24e150b9527a35c535889f6fc3375cb935e56bae4805918e086c5b5a17d7d2e336ed7e15", 0x6e, 0x400, 0x0, 0x1}, &(0x7f0000000400)) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x27ffd) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 1487.831899][T14561] loop0: detected capacity change from 264192 to 0 [ 1487.863451][T14561] FAT-fs (loop0): bogus number of FAT sectors [ 1487.931787][ T35] kauditd_printk_skb: 1 callbacks suppressed [ 1487.931806][ T35] audit: type=1800 audit(1611904890.376:3026): pid=14565 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16373 res=0 errno=0 [ 1488.007541][T14561] FAT-fs (loop0): Can't find a valid FAT filesystem 07:21:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002580)={&(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f0000002440)=[{0x0, 0xe803000000000000}, {&(0x7f0000000100)="fa", 0x1}], 0x2, &(0x7f0000002500)=ANY=[@ANYBLOB="14000000000000002900000043000000030000000000000020000000000000002900000004000000df000000000077000502003f0000000014"], 0x50}, 0x0) [ 1488.149948][T14569] loop4: detected capacity change from 264192 to 0 [ 1488.205087][ T35] audit: type=1800 audit(1611904890.656:3027): pid=14569 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=116 res=0 errno=0 [ 1650.815199][ T1644] INFO: task syz-executor.2:14508 blocked for more than 143 seconds. [ 1650.823759][ T1644] Not tainted 5.11.0-rc5-syzkaller #0 [ 1650.864909][ T1644] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1650.884928][ T1644] task:syz-executor.2 state:D stack:28752 pid:14508 ppid: 8468 flags:0x00004004 [ 1650.894203][ T1644] Call Trace: [ 1650.914874][ T1644] __schedule+0x999/0xe70 [ 1650.919721][ T1644] schedule+0x14b/0x200 [ 1650.944912][ T1644] schedule_preempt_disabled+0xf/0x20 [ 1650.951083][ T1644] __mutex_lock_common+0x124f/0x2f00 [ 1650.966065][ T1644] ? sock_do_ioctl+0x11e/0x260 [ 1650.971146][ T1644] mutex_lock_nested+0x1a/0x20 [ 1650.994870][ T1644] sock_do_ioctl+0x11e/0x260 [ 1651.000613][ T1644] sock_ioctl+0x416/0x5f0 [ 1651.016325][ T1644] ? bpf_lsm_file_ioctl+0x5/0x10 [ 1651.021408][ T1644] ? sock_poll+0x400/0x400 [ 1651.044910][ T1644] __se_sys_ioctl+0xfb/0x170 [ 1651.049583][ T1644] do_syscall_64+0x2d/0x70 [ 1651.054556][ T1644] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1651.074886][ T1644] RIP: 0033:0x45e219 [ 1651.078859][ T1644] RSP: 002b:00007f92fe62ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1651.104909][ T1644] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 1651.114188][ T1644] RDX: 0000000000400200 RSI: 0000000000008912 RDI: 0000000000000003 [ 1651.144894][ T1644] RBP: 000000000119bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 1651.153113][ T1644] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 1651.184933][ T1644] R13: 00007ffef7c7ca2f R14: 00007f92fe62b9c0 R15: 000000000119bf8c [ 1651.196505][ T1644] INFO: task syz-executor.5:14536 blocked for more than 143 seconds. [ 1651.215205][ T1644] Not tainted 5.11.0-rc5-syzkaller #0 [ 1651.221258][ T1644] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1651.254865][ T1644] task:syz-executor.5 state:D stack:25248 pid:14536 ppid: 8541 flags:0x00004004 [ 1651.264253][ T1644] Call Trace: [ 1651.284952][ T1644] __schedule+0x999/0xe70 [ 1651.290413][ T1644] schedule+0x14b/0x200 [ 1651.304964][ T1644] schedule_preempt_disabled+0xf/0x20 [ 1651.310407][ T1644] __mutex_lock_common+0x124f/0x2f00 [ 1651.334890][ T1644] ? rtnetlink_rcv_msg+0x83a/0xd60 [ 1651.340158][ T1644] mutex_lock_nested+0x1a/0x20 [ 1651.356105][ T1644] rtnetlink_rcv_msg+0x83a/0xd60 [ 1651.361143][ T1644] ? rcu_lock_release+0x9/0x20 [ 1651.384951][ T1644] ? __local_bh_enable_ip+0xf8/0x170 [ 1651.390484][ T1644] ? lockdep_hardirqs_on+0x8d/0x130 [ 1651.414867][ T1644] ? local_bh_enable+0x5/0x20 [ 1651.419682][ T1644] ? __local_bh_enable_ip+0xf8/0x170 [ 1651.434949][ T1644] ? __dev_queue_xmit+0x1960/0x2a10 [ 1651.441151][ T1644] netlink_rcv_skb+0x190/0x3a0 [ 1651.456393][ T1644] ? rtnetlink_bind+0x80/0x80 [ 1651.461644][ T1644] netlink_unicast+0x786/0x940 [ 1651.486108][ T1644] netlink_sendmsg+0x9ae/0xd50 [ 1651.491949][ T1644] ? netlink_getsockopt+0xa50/0xa50 [ 1651.504963][ T1644] ____sys_sendmsg+0x519/0x800 [ 1651.509794][ T1644] ? import_iovec+0xe6/0x120 [ 1651.514481][ T1644] __sys_sendmsg+0x2bf/0x370 [ 1651.534885][ T1644] ? __might_fault+0xb8/0x110 [ 1651.539767][ T1644] ? syscall_enter_from_user_mode+0x24/0x190 [ 1651.566282][ T1644] ? lockdep_hardirqs_on+0x8d/0x130 [ 1651.571670][ T1644] ? syscall_enter_from_user_mode+0x24/0x190 [ 1651.594874][ T1644] do_syscall_64+0x2d/0x70 [ 1651.599386][ T1644] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1651.616089][ T1644] RIP: 0033:0x45e219 [ 1651.620070][ T1644] RSP: 002b:00007f07be9c9c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1651.644897][ T1644] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 1651.654671][ T1644] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 1651.665760][ T1644] RBP: 000000000119bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 1651.673789][ T1644] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 1651.685156][ T1644] R13: 00007ffe31340e8f R14: 00007f07be9ca9c0 R15: 000000000119bf8c [ 1651.693292][ T1644] INFO: task syz-executor.1:14555 blocked for more than 144 seconds. [ 1651.703238][ T1644] Not tainted 5.11.0-rc5-syzkaller #0 [ 1651.710936][ T1644] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1651.721428][ T1644] task:syz-executor.1 state:D stack:28160 pid:14555 ppid: 8466 flags:0x00004004 [ 1651.733282][ T1644] Call Trace: [ 1651.738247][ T1644] __schedule+0x999/0xe70 [ 1651.742637][ T1644] schedule+0x14b/0x200 [ 1651.764919][ T1644] schedule_preempt_disabled+0xf/0x20 [ 1651.770478][ T1644] __mutex_lock_common+0x124f/0x2f00 [ 1651.792838][ T1644] ? ipv6_setsockopt+0x3c8/0x5520 [ 1651.821734][ T1644] mutex_lock_nested+0x1a/0x20 [ 1651.829495][ T1644] ipv6_setsockopt+0x3c8/0x5520 [ 1651.856672][ T1644] ? rcu_lock_release+0x9/0x20 [ 1651.861623][ T1644] ? __fget_files+0x34f/0x380 [ 1651.868737][ T1644] ? sock_common_recvmsg+0x190/0x190 [ 1651.874171][ T1644] __sys_setsockopt+0x4b8/0x880 [ 1651.896435][ T1644] __x64_sys_setsockopt+0xb1/0xc0 [ 1651.901528][ T1644] do_syscall_64+0x2d/0x70 [ 1651.915526][ T1644] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1651.921487][ T1644] RIP: 0033:0x45e219 [ 1651.937249][ T1644] RSP: 002b:00007fac95307c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1651.957862][ T1644] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e219 [ 1651.987052][ T1644] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 1652.013367][ T1644] RBP: 000000000119bfd0 R08: 0000000000000108 R09: 0000000000000000 [ 1652.042186][ T1644] R10: 0000000020000100 R11: 0000000000000246 R12: 000000000119bf8c [ 1652.065050][ T1644] R13: 00007ffed3d94f0f R14: 00007fac953089c0 R15: 000000000119bf8c [ 1652.073181][ T1644] [ 1652.073181][ T1644] Showing all locks held in the system: [ 1652.097143][ T1644] 2 locks held by kworker/u4:0/8: [ 1652.102248][ T1644] 4 locks held by kworker/u4:1/24: [ 1652.127864][ T1644] #0: ffff888011293138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x6f4/0xfc0 [ 1652.154880][ T1644] #1: ffffc90000defd78 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x733/0xfc0 [ 1652.182985][ T1644] #2: ffffffff8cce2cf0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xac/0xbd0 [ 1652.217119][ T1644] #3: ffffffff8ccee648 (rtnl_mutex){+.+.}-{3:3}, at: wg_netns_pre_exit+0x1b/0x1a0 [ 1652.234869][ T1644] 3 locks held by kworker/1:1/34: [ 1652.240303][ T1644] #0: ffff8880217df938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x6f4/0xfc0 [ 1652.274863][ T1644] #1: ffffc90000e2fd78 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x733/0xfc0 [ 1652.294881][ T1644] #2: ffffffff8ccee648 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 1652.314922][ T1644] 1 lock held by khungtaskd/1644: [ 1652.320623][ T1644] #0: ffffffff8bd11740 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1652.354911][ T1644] 2 locks held by systemd-journal/4865: [ 1652.361775][ T1644] 1 lock held by in:imklog/8125: [ 1652.384884][ T1644] #0: ffff888026148870 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0x24e/0x2f0 [ 1652.404896][ T1644] 3 locks held by kworker/u4:5/10172: [ 1652.411485][ T1644] 1 lock held by syz-executor.2/14508: [ 1652.421054][ T1644] #0: ffffffff8ccee648 (rtnl_mutex){+.+.}-{3:3}, at: sock_do_ioctl+0x11e/0x260 [ 1652.441303][ T1644] 1 lock held by syz-executor.5/14536: [ 1652.463511][ T1644] #0: ffffffff8ccee648 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x83a/0xd60 [ 1652.479447][ T1644] 2 locks held by syz-executor.5/14543: [ 1652.493954][ T1644] 1 lock held by syz-executor.1/14555: [ 1652.506196][ T1644] #0: ffffffff8ccee648 (rtnl_mutex){+.+.}-{3:3}, at: ipv6_setsockopt+0x3c8/0x5520 [ 1652.522097][ T1644] [ 1652.529454][ T1644] ============================================= [ 1652.529454][ T1644] [ 1652.554046][ T1644] NMI backtrace for cpu 1 [ 1652.559317][ T1644] CPU: 1 PID: 1644 Comm: khungtaskd Not tainted 5.11.0-rc5-syzkaller #0 [ 1652.567673][ T1644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1652.577756][ T1644] Call Trace: [ 1652.582116][ T1644] dump_stack+0x137/0x1be [ 1652.587731][ T1644] ? nmi_cpu_backtrace+0x94/0x190 [ 1652.595152][ T1644] ? asan.module_dtor+0x20/0x20 [ 1652.600144][ T1644] nmi_cpu_backtrace+0x16c/0x190 [ 1652.605670][ T1644] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1652.612833][ T1644] nmi_trigger_cpumask_backtrace+0x191/0x2f0 [ 1652.618873][ T1644] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1652.625844][ T1644] watchdog+0xce9/0xd30 [ 1652.630869][ T1644] ? hungtask_pm_notify+0x50/0x50 [ 1652.636571][ T1644] kthread+0x39a/0x3c0 [ 1652.640870][ T1644] ? hungtask_pm_notify+0x50/0x50 [ 1652.645924][ T1644] ? kthread_blkcg+0xd0/0xd0 [ 1652.650993][ T1644] ret_from_fork+0x1f/0x30 [ 1652.656270][ T1644] Sending NMI from CPU 1 to CPUs 0: [ 1652.661916][ C0] NMI backtrace for cpu 0 [ 1652.661927][ C0] CPU: 0 PID: 107 Comm: kworker/u4:3 Not tainted 5.11.0-rc5-syzkaller #0 [ 1652.661933][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1652.661940][ C0] Workqueue: bat_events batadv_tt_purge [ 1652.661950][ C0] RIP: 0010:do_raw_spin_unlock+0x6f/0x8a0 [ 1652.661957][ C0] Code: 00 4c 89 ff be 04 00 00 00 e8 dd 96 5d 00 4c 89 f8 48 c1 e8 03 8a 04 18 84 c0 0f 85 25 04 00 00 41 83 3f 00 0f 84 9a 01 00 00 <4d> 8d 6f 10 4d 89 ec 49 c1 ec 03 41 80 3c 1c 00 74 08 4c 89 ef e8 [ 1652.661966][ C0] RSP: 0018:ffffc900011ffb58 EFLAGS: 00000202 [ 1652.661974][ C0] RAX: 1ffff1100ea5c600 RBX: dffffc0000000000 RCX: ffffffff815d8b33 [ 1652.661980][ C0] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff8880752e31c0 [ 1652.661985][ C0] RBP: 00000000000000c7 R08: dffffc0000000000 R09: ffffed100ea5c639 [ 1652.661990][ C0] R10: ffffed100ea5c639 R11: 0000000000000000 R12: 0000000000000000 [ 1652.661996][ C0] R13: dffffc0000000000 R14: ffffffff892d27af R15: ffff8880752e31c0 [ 1652.662002][ C0] FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 1652.662008][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1652.662013][ C0] CR2: 00007f11c30f5000 CR3: 0000000011e3d000 CR4: 00000000001506f0 [ 1652.662018][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1652.662024][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1652.662029][ C0] Call Trace: [ 1652.662032][ C0] ? batadv_tt_local_purge+0x2bf/0x350 [ 1652.662037][ C0] _raw_spin_unlock_bh+0x1f/0x30 [ 1652.662041][ C0] batadv_tt_local_purge+0x2bf/0x350 [ 1652.662046][ C0] batadv_tt_purge+0x31/0x960 [ 1652.662050][ C0] ? rcu_read_lock_sched_held+0x41/0xb0 [ 1652.662054][ C0] process_one_work+0x789/0xfc0 [ 1652.662058][ C0] worker_thread+0xac1/0x1300 [ 1652.662062][ C0] ? rcu_lock_release+0x20/0x20 [ 1652.662066][ C0] kthread+0x39a/0x3c0 [ 1652.662070][ C0] ? rcu_lock_release+0x20/0x20 [ 1652.662074][ C0] ? kthread_blkcg+0xd0/0xd0 [ 1652.662078][ C0] ret_from_fork+0x1f/0x30 [ 1652.765726][ T1644] Kernel panic - not syncing: hung_task: blocked tasks [ 1652.878824][ T1644] CPU: 1 PID: 1644 Comm: khungtaskd Not tainted 5.11.0-rc5-syzkaller #0 [ 1652.887360][ T1644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1652.900393][ T1644] Call Trace: [ 1652.904712][ T1644] dump_stack+0x137/0x1be [ 1652.909089][ T1644] ? panic+0x1f3/0x800 [ 1652.914517][ T1644] panic+0x291/0x800 [ 1652.920211][ T1644] ? nmi_trigger_cpumask_backtrace+0x236/0x2f0 [ 1652.927608][ T1644] ? nmi_trigger_cpumask_backtrace+0x29b/0x2f0 [ 1652.933793][ T1644] ? nmi_trigger_cpumask_backtrace+0x236/0x2f0 [ 1652.940182][ T1644] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2f0 [ 1652.946557][ T1644] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1652.956476][ T1644] watchdog+0xd29/0xd30 [ 1652.960975][ T1644] ? hungtask_pm_notify+0x50/0x50 [ 1652.967286][ T1644] kthread+0x39a/0x3c0 [ 1652.971408][ T1644] ? hungtask_pm_notify+0x50/0x50 [ 1652.976462][ T1644] ? kthread_blkcg+0xd0/0xd0 [ 1652.981887][ T1644] ret_from_fork+0x1f/0x30 [ 1652.987072][ T1644] Kernel Offset: disabled [ 1652.991419][ T1644] Rebooting in 86400 seconds..