0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') [ 396.494883][T13418] loop2: detected capacity change from 0 to 1 [ 396.503784][T13412] EXT4-fs warning (device sda1): ext4_group_extend:1828: will only finish group (524288 blocks, 256 new) 08:19:47 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f00000005c0)=""/229, 0x2a, 0xe5, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={r0, 0x10, &(0x7f0000000440)={&(0x7f0000000380)=""/177, 0xb1}}, 0x10) 08:19:47 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 396.655617][T13412] EXT4-fs warning (device sda1): ext4_group_extend:1834: can't read last block, resize aborted 08:19:47 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f0000000100)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880367fb0a0002000612da1b40d805000374c50083b8", 0x2e}], 0x1}, 0x0) [ 396.709538][T13418] loop2: p2 < > p3 p4 [ 396.714441][T13418] loop2: partition table partially beyond EOD, truncated 08:19:47 executing program 4: sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) recvmsg$unix(r0, 0x0, 0x10002) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000ac0), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000b40)=""/153, 0x99}, {&(0x7f0000000c00)=""/73, 0x49}], 0x2, &(0x7f0000000c80)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086607, &(0x7f0000000080)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x82, 0x20, 0xff, 0xf2, 0x0, 0x9, 0x6002, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8, 0x8}, 0x0, 0x188c, 0x0, 0x6, 0x8, 0x1f, 0x1, 0x0, 0x6d, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) [ 396.762283][T13418] loop2: p2 size 2 extends beyond EOD, truncated [ 396.829629][T13418] loop2: p3 start 225 is beyond EOD, truncated [ 396.862277][T13449] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. 08:19:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10020}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x95}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000940), 0x88000, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2}, 0xbad3, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/95, 0x5f}, {&(0x7f00000004c0)=""/251, 0xfb}, {&(0x7f00000001c0)=""/42, 0x2a}, {&(0x7f00000005c0)=""/242, 0xf2}], 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100008001000000", @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRESOCT, @ANYRES32], 0xc0}, 0x2) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x3f, 0x40, 0x0, 0x0, 0x6, 0x800, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000180), 0x8}, 0xea7c7b27ce9b1733, 0x3, 0x3f, 0x7, 0x0, 0x2, 0x3, 0x0, 0x9, 0x0, 0x40}, r2, 0xe, r3, 0x0) mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x145) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 396.885519][T13418] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 396.983226][T13451] loop1: detected capacity change from 0 to 7 [ 397.160282][T13450] EXT4-fs warning (device sda1): ext4_group_extend:1828: will only finish group (524288 blocks, 256 new) [ 397.283004][T13450] EXT4-fs warning (device sda1): ext4_group_extend:1834: can't read last block, resize aborted [ 397.710452][T13452] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. 08:19:48 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) sched_setscheduler(r1, 0x3, &(0x7f0000000080)=0xa2) getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:19:48 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:19:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000005c0)=""/229, 0x1a, 0xe5, 0x1}, 0x20) 08:19:48 executing program 4: sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) recvmsg$unix(r0, 0x0, 0x10002) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000ac0), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000b40)=""/153, 0x99}, {&(0x7f0000000c00)=""/73, 0x49}], 0x2, &(0x7f0000000c80)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086607, &(0x7f0000000080)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x82, 0x20, 0xff, 0xf2, 0x0, 0x9, 0x6002, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8, 0x8}, 0x0, 0x188c, 0x0, 0x6, 0x8, 0x1f, 0x1, 0x0, 0x6d, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 08:19:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x5}]}}, &(0x7f00000005c0)=""/229, 0x2a, 0xe5, 0x1}, 0x20) 08:19:48 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000080)="80", 0x1}], 0x1}, 0x0) close(r0) 08:19:48 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000005c0)=""/229, 0x26, 0xe5, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000040)=@raw=[@exit], &(0x7f0000000080)='GPL\x00', 0x6, 0xcc, &(0x7f00000000c0)=""/204, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000200), 0x10}, 0x78) 08:19:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x18, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001ac0)={0xffffffffffffffff, 0x0, 0x3, 0x0, &(0x7f00000001c0)="ba9765", 0x0, 0x875c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x19, 0x8, &(0x7f0000000ac0)=@raw=[@ldst={0x2, 0x2, 0x2, 0x2, 0x6, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x0, 0xa, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @ldst={0x0, 0x78eac0046ee9710b, 0x0, 0x2, 0x9, 0x0, 0x4}, @generic={0x19, 0x0, 0xd, 0xfffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}], 0x0, 0x0, 0xb3, &(0x7f0000000d00)=""/179, 0x40f00, 0x6, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000e00), 0x8, 0x10, &(0x7f0000000e40)={0x0, 0xb, 0x1, 0x3}, 0x10, 0xffffffffffffffff, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, 0x0, 0x2000) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:19:48 executing program 5: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x1, 0x0, 0x0, 0x0, 0x1, 0x46280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') 08:19:48 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe, 0x0, &(0x7f0000000280)="b95b03b708030000009e40f086dd", 0x0, 0x0, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 397.958016][T13480] loop1: detected capacity change from 0 to 7 [ 398.127619][T13488] loop2: detected capacity change from 0 to 1 08:19:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) close(r0) write$cgroup_type(r0, &(0x7f0000000240), 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@isdn={0x22, 0x8, 0x1, 0x1f}, 0x80}, 0x20040840) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000511d25a80648c63940d0124fc6009100617020002000200001737153e370a0001800a000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 398.364585][T13488] loop2: p2 < > p3 p4 [ 398.369217][T13488] loop2: partition table partially beyond EOD, truncated 08:19:48 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 398.476679][T13488] loop2: p2 size 2 extends beyond EOD, truncated [ 398.548267][T13488] loop2: p3 start 225 is beyond EOD, truncated [ 398.595851][T13488] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 398.784470][T13521] loop1: detected capacity change from 0 to 7 08:19:49 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) sched_setscheduler(r1, 0x3, &(0x7f0000000080)=0xa2) getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:19:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x18, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001ac0)={0xffffffffffffffff, 0x0, 0x3, 0x0, &(0x7f00000001c0)="ba9765", 0x0, 0x875c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x19, 0x8, &(0x7f0000000ac0)=@raw=[@ldst={0x2, 0x2, 0x2, 0x2, 0x6, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x0, 0xa, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @ldst={0x0, 0x78eac0046ee9710b, 0x0, 0x2, 0x9, 0x0, 0x4}, @generic={0x19, 0x0, 0xd, 0xfffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}], 0x0, 0x0, 0xb3, &(0x7f0000000d00)=""/179, 0x40f00, 0x6, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000e00), 0x8, 0x10, &(0x7f0000000e40)={0x0, 0xb, 0x1, 0x3}, 0x10, 0xffffffffffffffff, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, 0x0, 0x2000) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:19:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto, @int={0x0, 0x0, 0x0, 0x1, 0xa000000}]}}, &(0x7f00000005c0)=""/229, 0x36, 0xe5, 0x1}, 0x20) 08:19:49 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:19:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) close(r0) write$cgroup_type(r0, &(0x7f0000000240), 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@isdn={0x22, 0x8, 0x1, 0x1f}, 0x80}, 0x20040840) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000511d25a80648c63940d0124fc6009100617020002000200001737153e370a0001800a000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:19:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}]}}, &(0x7f00000005c0)=""/229, 0x2a, 0xe5, 0x1}, 0x20) 08:19:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x3, 0x3, &(0x7f0000001780)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 399.354945][T13551] loop1: detected capacity change from 0 to 7 08:19:49 executing program 4: sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) recvmsg$unix(r0, 0x0, 0x10002) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000ac0), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000b40)=""/153, 0x99}, {&(0x7f0000000c00)=""/73, 0x49}], 0x2, &(0x7f0000000c80)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086607, &(0x7f0000000080)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x82, 0x20, 0xff, 0xf2, 0x0, 0x9, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x8, 0x8}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1f, 0x0, 0x0, 0x6d, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xa) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 08:19:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) close(r0) write$cgroup_type(r0, &(0x7f0000000240), 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@isdn={0x22, 0x8, 0x1, 0x1f}, 0x80}, 0x20040840) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000511d25a80648c63940d0124fc6009100617020002000200001737153e370a0001800a000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 399.444245][T13556] loop2: detected capacity change from 0 to 1 08:19:50 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:19:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f00000005c0)=""/229, 0x26, 0xe5, 0x1}, 0x20) 08:19:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x18, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001ac0)={0xffffffffffffffff, 0x0, 0x3, 0x0, &(0x7f00000001c0)="ba9765", 0x0, 0x875c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x19, 0x8, &(0x7f0000000ac0)=@raw=[@ldst={0x2, 0x2, 0x2, 0x2, 0x6, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x0, 0xa, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @ldst={0x0, 0x78eac0046ee9710b, 0x0, 0x2, 0x9, 0x0, 0x4}, @generic={0x19, 0x0, 0xd, 0xfffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}], 0x0, 0x0, 0xb3, &(0x7f0000000d00)=""/179, 0x40f00, 0x6, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000e00), 0x8, 0x10, &(0x7f0000000e40)={0x0, 0xb, 0x1, 0x3}, 0x10, 0xffffffffffffffff, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, 0x0, 0x2000) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 399.694974][ T2970] loop2: p2 < > p3 p4 [ 399.699305][ T2970] loop2: partition table partially beyond EOD, truncated [ 399.729688][ T2970] loop2: p2 size 2 extends beyond EOD, truncated [ 399.756178][ T2970] loop2: p3 start 225 is beyond EOD, truncated [ 399.792038][ T2970] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 399.824354][T13578] loop1: detected capacity change from 0 to 7 [ 399.887075][T13556] loop2: p2 < > p3 p4 [ 399.895497][T13556] loop2: partition table partially beyond EOD, truncated [ 399.906233][T13556] loop2: p2 size 2 extends beyond EOD, truncated [ 399.988776][T13556] loop2: p3 start 225 is beyond EOD, truncated [ 399.999729][T13556] loop2: p4 size 3657465856 extends beyond EOD, truncated 08:19:50 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) sched_setscheduler(r1, 0x3, &(0x7f0000000080)=0xa2) getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:19:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x3, 0x3, &(0x7f0000001780)=@framed={{0x18, 0x0, 0x0, 0x5}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:19:50 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000040)='7', 0x1}], 0x1}, 0x0) close(r0) 08:19:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2}}]}}, &(0x7f0000000280)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:19:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x3, 0x3, &(0x7f0000001780)=@framed={{0x18, 0xa}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:19:50 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:19:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1b0000001e008100008ac609975e84dd0710000000000000000032", 0x1b}], 0x1}, 0x0) 08:19:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x3, 0x3, &(0x7f0000001780)=@framed={{0x18, 0x0, 0x6}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:19:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x28, 0x5}]}}, &(0x7f00000005c0)=""/229, 0x2a, 0xe5, 0x1}, 0x20) 08:19:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x1000000}]}}, &(0x7f00000005c0)=""/229, 0x2a, 0xe5, 0x1}, 0x20) [ 400.450939][T13610] loop1: detected capacity change from 0 to 7 [ 400.483936][T13611] loop2: detected capacity change from 0 to 1 08:19:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto, @int]}}, &(0x7f00000005c0)=""/229, 0x36, 0xe5, 0x1}, 0x20) 08:19:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x3, 0x3, &(0x7f0000001780)=@framed={{0x18, 0x0, 0x2}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 400.674094][T13611] loop2: p2 < > p3 p4 [ 400.680893][T13611] loop2: partition table partially beyond EOD, truncated [ 400.741274][T13611] loop2: p2 size 2 extends beyond EOD, truncated [ 400.769089][T13611] loop2: p3 start 225 is beyond EOD, truncated [ 400.790495][T13611] loop2: p4 size 3657465856 extends beyond EOD, truncated 08:19:51 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) sched_setscheduler(r1, 0x3, &(0x7f0000000080)=0xa2) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:19:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, &(0x7f00000005c0)=""/229, 0x2e, 0xe5, 0x1}, 0x20) 08:19:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:19:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000005c0)=""/229, 0x1a, 0xe5, 0x1}, 0x20) 08:19:51 executing program 1: unshare(0x22020000) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:19:51 executing program 3: socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x60}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000240)=@ax25={{0x3, @default, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null]}, 0x80, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000001c0)="11a10f494a643b63bf4a8703a1c56584afbb69fd113ecb4a6f8428350225aa9596a96bac981c98688c744f0cfa3404c1", 0x30}, {&(0x7f0000000640)="0e3ac2c0c28b9c7ad041e9de50d292c03fc200c5004c71902d29a384bcb9b5c9bac74145691a46c832ad4fcd7ddb1f9aad7fd0bdb1b7f7734f492181cd5a9790f12ef335633fec1ef072e8306f87977f113d9d3f670259475cf7baacf98210af3f57ad84530dc9a85d4b7dc5f2dbf5c2a810f0178800ac98e765c97265038d6e453e6dc315fbf27f0bbea94090947d18d8df2290418906c71a898bd73b9aaec6051537c1d350917b057b531ee68c8c4105d25e908b2bd808a533448194dc9064cc080c4dce76608a78ea7e1c00739d8b7952bca5aea8591e69112e5482f9fe827b", 0xe1}, {&(0x7f0000000740)="7b8230d8e17e32d4035b6a57364e4847b39873f3b1b14a7353f536d5b319c70559e3a44ff2b2a1b08da217745239e04cc6a031f8a6871e204fdeea6f4dcf5337a9a2bc590e97dae18ca71661ed9d8936841c218f1869087a75e2f56468695840b8b9174dc0c4d1787a63a6f8f92a30eab2c36e58da4177cb080d6241481438d0cc94c30e572e61e53783a6ae439a8936a5a52e55ba6a2ba8b62a83b2d8091bee942da339e25d37e5305048a1037f848309", 0xb1}], 0x4, &(0x7f0000000800)=[{0x70, 0x0, 0x4324, "e764b06bb24127cd3f4a56137619f89a7c20e7702b79b17813ab79d0187f36161b384be5ce09de76abb2a4509266108da255f4d44c758c4aa2d9a5d523ee82ecc5252278c8cbf4343b7a9113c30d2bb52d16c70c4ca5b45fe12d61d818c35f"}, {0x50, 0x118, 0x5, "d2762470e1d774b28ae8d3d4c54432d00a06502d797dc42f9f0849b44e32f1ed34bab20bb6f6f429c0fad4fd5f91471014722b68d3a6084557923d139e101e4e"}, {0x58, 0x110, 0x2, "f5c9932bdf44b432bbebf3764e3e3f99c420c89e9bcda20448d9381c3e25f037fab31e9fec4d617685e0f251ec6e61020937a984d5c43031a9c6cda68ba0f38203de0440c7e0"}], 0x118}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="766352d1678f45aca90000000000000000ee8d"], &(0x7f0000000500)='syzkaller\x00', 0x7f, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x4, 0x8001, 0x7}, 0x10, 0xffffffffffffffff}, 0x78) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='memory.swap.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f00000000c0)=[{0x5}, {0x28}, {0x6}]}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x301) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="b4090000000000000600"]) socket$kcm(0x29, 0x5, 0x0) 08:19:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 401.079497][T13648] loop1: detected capacity change from 0 to 7 08:19:51 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000005c0)=""/229, 0x26, 0xe5, 0x1}, 0x20) close(r0) 08:19:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x3, 0x3, &(0x7f0000001780)=@framed={{0x18, 0x3}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 401.348522][T13658] loop2: detected capacity change from 0 to 1 08:19:51 executing program 1: unshare(0x22020000) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 401.538395][T13658] loop2: p2 < > p3 p4 08:19:51 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f00000001c0)) [ 401.560825][T13658] loop2: partition table partially beyond EOD, truncated [ 401.616564][T13658] loop2: p2 size 2 extends beyond EOD, truncated 08:19:52 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001800), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) [ 401.698723][T13658] loop2: p3 start 225 is beyond EOD, truncated [ 401.704569][T13688] loop1: detected capacity change from 0 to 7 [ 401.735864][T13658] loop2: p4 size 3657465856 extends beyond EOD, truncated 08:19:52 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) sched_setscheduler(r1, 0x3, &(0x7f0000000080)=0xa2) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:19:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:19:52 executing program 3: socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x60}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000240)=@ax25={{0x3, @default, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null]}, 0x80, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000001c0)="11a10f494a643b63bf4a8703a1c56584afbb69fd113ecb4a6f8428350225aa9596a96bac981c98688c744f0cfa3404c1", 0x30}, {&(0x7f0000000640)="0e3ac2c0c28b9c7ad041e9de50d292c03fc200c5004c71902d29a384bcb9b5c9bac74145691a46c832ad4fcd7ddb1f9aad7fd0bdb1b7f7734f492181cd5a9790f12ef335633fec1ef072e8306f87977f113d9d3f670259475cf7baacf98210af3f57ad84530dc9a85d4b7dc5f2dbf5c2a810f0178800ac98e765c97265038d6e453e6dc315fbf27f0bbea94090947d18d8df2290418906c71a898bd73b9aaec6051537c1d350917b057b531ee68c8c4105d25e908b2bd808a533448194dc9064cc080c4dce76608a78ea7e1c00739d8b7952bca5aea8591e69112e5482f9fe827b", 0xe1}, {&(0x7f0000000740)="7b8230d8e17e32d4035b6a57364e4847b39873f3b1b14a7353f536d5b319c70559e3a44ff2b2a1b08da217745239e04cc6a031f8a6871e204fdeea6f4dcf5337a9a2bc590e97dae18ca71661ed9d8936841c218f1869087a75e2f56468695840b8b9174dc0c4d1787a63a6f8f92a30eab2c36e58da4177cb080d6241481438d0cc94c30e572e61e53783a6ae439a8936a5a52e55ba6a2ba8b62a83b2d8091bee942da339e25d37e5305048a1037f848309", 0xb1}], 0x4, &(0x7f0000000800)=[{0x70, 0x0, 0x4324, "e764b06bb24127cd3f4a56137619f89a7c20e7702b79b17813ab79d0187f36161b384be5ce09de76abb2a4509266108da255f4d44c758c4aa2d9a5d523ee82ecc5252278c8cbf4343b7a9113c30d2bb52d16c70c4ca5b45fe12d61d818c35f"}, {0x50, 0x118, 0x5, "d2762470e1d774b28ae8d3d4c54432d00a06502d797dc42f9f0849b44e32f1ed34bab20bb6f6f429c0fad4fd5f91471014722b68d3a6084557923d139e101e4e"}, {0x58, 0x110, 0x2, "f5c9932bdf44b432bbebf3764e3e3f99c420c89e9bcda20448d9381c3e25f037fab31e9fec4d617685e0f251ec6e61020937a984d5c43031a9c6cda68ba0f38203de0440c7e0"}], 0x118}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="766352d1678f45aca90000000000000000ee8d"], &(0x7f0000000500)='syzkaller\x00', 0x7f, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x4, 0x8001, 0x7}, 0x10, 0xffffffffffffffff}, 0x78) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='memory.swap.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f00000000c0)=[{0x5}, {0x28}, {0x6}]}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x301) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="b4090000000000000600"]) socket$kcm(0x29, 0x5, 0x0) 08:19:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:19:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000180)) 08:19:52 executing program 1: unshare(0x22020000) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:19:52 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000000)) [ 402.214626][T13716] loop1: detected capacity change from 0 to 7 08:19:52 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, 0xfffffffffffffffe) 08:19:52 executing program 4: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, 0x0) [ 402.312209][T13721] loop2: detected capacity change from 0 to 1 08:19:52 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:19:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0x0, 0xa}, &(0x7f0000000040)=0x20) 08:19:52 executing program 3: socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x60}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000240)=@ax25={{0x3, @default, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null]}, 0x80, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000001c0)="11a10f494a643b63bf4a8703a1c56584afbb69fd113ecb4a6f8428350225aa9596a96bac981c98688c744f0cfa3404c1", 0x30}, {&(0x7f0000000640)="0e3ac2c0c28b9c7ad041e9de50d292c03fc200c5004c71902d29a384bcb9b5c9bac74145691a46c832ad4fcd7ddb1f9aad7fd0bdb1b7f7734f492181cd5a9790f12ef335633fec1ef072e8306f87977f113d9d3f670259475cf7baacf98210af3f57ad84530dc9a85d4b7dc5f2dbf5c2a810f0178800ac98e765c97265038d6e453e6dc315fbf27f0bbea94090947d18d8df2290418906c71a898bd73b9aaec6051537c1d350917b057b531ee68c8c4105d25e908b2bd808a533448194dc9064cc080c4dce76608a78ea7e1c00739d8b7952bca5aea8591e69112e5482f9fe827b", 0xe1}, {&(0x7f0000000740)="7b8230d8e17e32d4035b6a57364e4847b39873f3b1b14a7353f536d5b319c70559e3a44ff2b2a1b08da217745239e04cc6a031f8a6871e204fdeea6f4dcf5337a9a2bc590e97dae18ca71661ed9d8936841c218f1869087a75e2f56468695840b8b9174dc0c4d1787a63a6f8f92a30eab2c36e58da4177cb080d6241481438d0cc94c30e572e61e53783a6ae439a8936a5a52e55ba6a2ba8b62a83b2d8091bee942da339e25d37e5305048a1037f848309", 0xb1}], 0x4, &(0x7f0000000800)=[{0x70, 0x0, 0x4324, "e764b06bb24127cd3f4a56137619f89a7c20e7702b79b17813ab79d0187f36161b384be5ce09de76abb2a4509266108da255f4d44c758c4aa2d9a5d523ee82ecc5252278c8cbf4343b7a9113c30d2bb52d16c70c4ca5b45fe12d61d818c35f"}, {0x50, 0x118, 0x5, "d2762470e1d774b28ae8d3d4c54432d00a06502d797dc42f9f0849b44e32f1ed34bab20bb6f6f429c0fad4fd5f91471014722b68d3a6084557923d139e101e4e"}, {0x58, 0x110, 0x2, "f5c9932bdf44b432bbebf3764e3e3f99c420c89e9bcda20448d9381c3e25f037fab31e9fec4d617685e0f251ec6e61020937a984d5c43031a9c6cda68ba0f38203de0440c7e0"}], 0x118}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="766352d1678f45aca90000000000000000ee8d"], &(0x7f0000000500)='syzkaller\x00', 0x7f, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x4, 0x8001, 0x7}, 0x10, 0xffffffffffffffff}, 0x78) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='memory.swap.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f00000000c0)=[{0x5}, {0x28}, {0x6}]}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x301) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="b4090000000000000600"]) socket$kcm(0x29, 0x5, 0x0) [ 402.523065][T13721] loop2: p2 < > p3 p4 [ 402.548290][T13721] loop2: partition table partially beyond EOD, truncated [ 402.595286][T13721] loop2: p2 size 2 extends beyond EOD, truncated [ 402.700213][T13721] loop2: p3 start 225 is beyond EOD, truncated [ 402.709563][T13721] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 402.735224][T13747] loop1: detected capacity change from 0 to 7 08:19:53 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) sched_setscheduler(r1, 0x3, &(0x7f0000000080)=0xa2) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:19:53 executing program 0: r0 = socket(0x11, 0xa, 0x0) connect$inet6(r0, 0x0, 0x0) 08:19:53 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffc000/0x3000)=nil, 0x0, 0x3}) 08:19:53 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, 0x0) 08:19:53 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000300)={0x4}, &(0x7f0000000340)={0x8}, 0x0, 0x0) 08:19:53 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:19:53 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000280)={0x8}, 0x0, 0x0, 0x0) 08:19:53 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_int(r0, 0x29, 0x21, 0x0, 0x0) 08:19:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, 0x1c) 08:19:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @private1}}}, 0x90) [ 403.550691][T13778] loop1: detected capacity change from 0 to 7 [ 403.591600][T13781] loop2: detected capacity change from 0 to 1 08:19:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @private0, 0x0, 0xfffa}) 08:19:54 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 403.804190][T13781] loop2: p2 < > p3 p4 [ 403.818590][T13781] loop2: partition table partially beyond EOD, truncated [ 403.856166][T13781] loop2: p2 size 2 extends beyond EOD, truncated [ 403.896744][T13800] loop1: detected capacity change from 0 to 7 [ 403.924147][T13781] loop2: p3 start 225 is beyond EOD, truncated [ 403.940129][T13781] loop2: p4 size 3657465856 extends beyond EOD, truncated 08:19:54 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:19:54 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)=ANY=[@ANYBLOB="010080420d52e2"]) 08:19:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 08:19:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001300)={&(0x7f0000000080)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x674, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "fe8166760e0233468be795857b177c27ac45dfd6c051a57b9f8a6569b02eb8eb"}]}, {0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private1}}]}, {0xb8, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "eed815a2bdc85b334c242cfb135f4d390fbc2540128790c98356ec9693fa0238"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "332c3acac2f1c61e5903700780025c92832a21b72bae65175b79144775514cf7"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @loopback}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x48, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x44, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}]}]}, {0x298, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x268, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}]}]}, {0x280, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x260, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast1}}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x82c, 0x8, 0x0, 0x1, [{0x358, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x34c, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}]}, @WGPEER_A_FLAGS={0x8}]}, {0x244, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "5d7ca4d04a71489c99040aeb30db55173c21b3b4b5fc7a629dba28e29fc9c9b7"}, @WGPEER_A_ALLOWEDIPS={0x1b4, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast1}}]}, {0x200, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast2}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d4018c826605890d0d4cd18bfa947793d2ec5c19e29d9f36f490df6a116dc44c"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast1}}, @WGPEER_A_ALLOWEDIPS={0x19c, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}]}, {0x2c, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private1}}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}]}]}]}]}, 0xec8}}, 0x0) 08:19:54 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f00000001c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 08:19:54 executing program 1: unshare(0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:19:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="f0000000", @ANYRES16=r1, @ANYBLOB="01"], 0xf8}}, 0x0) [ 404.438391][T13820] loop1: detected capacity change from 0 to 7 08:19:54 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000180)={0x0, 0x0}) 08:19:54 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x7, 0x4) 08:19:55 executing program 1: unshare(0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 404.657910][T13829] loop2: detected capacity change from 0 to 1 08:19:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 08:19:55 executing program 3: pselect6(0xfffffffffffffe0a, &(0x7f0000000240), &(0x7f0000000280), 0x0, 0x0, 0x0) [ 404.808424][T13829] loop2: p2 < > p3 p4 [ 404.815734][T13829] loop2: partition table partially beyond EOD, truncated [ 404.847305][T13829] loop2: p2 size 2 extends beyond EOD, truncated [ 404.893775][T13829] loop2: p3 start 225 is beyond EOD, truncated [ 404.923713][T13845] loop1: detected capacity change from 0 to 7 [ 404.979843][T13829] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 405.696213][T13829] loop2: detected capacity change from 0 to 7 08:19:56 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) [ 405.979870][ T7912] Bluetooth: hci4: command 0x0406 tx timeout [ 406.117904][T13867] loop2: detected capacity change from 0 to 1 [ 406.252881][T13867] loop2: p2 < > p3 p4 [ 406.257244][T13867] loop2: partition table partially beyond EOD, truncated [ 406.282943][T13867] loop2: p2 size 2 extends beyond EOD, truncated [ 406.315178][T13867] loop2: p3 start 225 is beyond EOD, truncated [ 406.327673][T13867] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 406.978362][T13873] loop2: detected capacity change from 0 to 7 08:20:00 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 08:20:00 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000100)={&(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0, 0xc1}) 08:20:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 08:20:00 executing program 1: unshare(0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet6(r0, &(0x7f0000005900)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000140)="f5", 0x1}], 0x2}}], 0x1, 0x0) 08:20:00 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x20) [ 409.957803][T13891] loop2: detected capacity change from 0 to 1 08:20:00 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x802, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6800) 08:20:00 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 08:20:00 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) [ 410.047344][T13895] loop1: detected capacity change from 0 to 7 [ 410.094385][T13891] loop2: p2 < > p3 p4 [ 410.098690][T13891] loop2: partition table partially beyond EOD, truncated 08:20:00 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, 0x0) 08:20:00 executing program 1: unshare(0x22020000) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 410.187797][T13891] loop2: p2 size 2 extends beyond EOD, truncated 08:20:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet6(r0, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@hoplimit={{0x14}}, @rthdr={{0x18}}], 0x30}}], 0x1, 0x0) 08:20:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x20) 08:20:00 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, &(0x7f0000000100)) [ 410.263316][T13891] loop2: p3 start 225 is beyond EOD, truncated 08:20:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@loopback, 0x0, 0x0, 0x0, 0xd}, 0x20) [ 410.312223][T13891] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 410.359069][T13917] loop1: detected capacity change from 0 to 7 08:20:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x2}, 0x20) [ 410.632950][T13931] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 410.780850][T13891] loop2: detected capacity change from 0 to 7 08:20:01 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:01 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000000c0)="ca", 0x1}, {&(0x7f00000001c0)='j', 0x1}], 0x2}, 0x0) 08:20:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_mreq(r0, 0x29, 0x14, 0x0, 0x0) 08:20:01 executing program 0: io_setup(0xb082, &(0x7f00000000c0)=0x0) io_getevents(r0, 0xffffffffffffffad, 0x0, 0x0, 0x0) 08:20:01 executing program 1: unshare(0x22020000) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @private0}) 08:20:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000280)={'icmp6\x00'}, &(0x7f00000002c0)=0x1e) 08:20:01 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000080)={0x85}) 08:20:01 executing program 3: socket$inet6(0xa, 0x0, 0x8000007e) [ 411.049854][T13957] loop1: detected capacity change from 0 to 7 [ 411.062613][T13960] loop2: detected capacity change from 0 to 1 08:20:01 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) 08:20:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 411.166381][T13960] loop2: p2 < > p3 p4 [ 411.186903][T13960] loop2: partition table partially beyond EOD, truncated [ 411.204504][T13960] loop2: p2 size 2 extends beyond EOD, truncated 08:20:01 executing program 1: unshare(0x22020000) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 411.234864][T13960] loop2: p3 start 225 is beyond EOD, truncated [ 411.259047][T13960] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 411.518438][T13985] loop1: detected capacity change from 0 to 7 08:20:02 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x0) 08:20:02 executing program 3: syz_open_dev$dri(&(0x7f0000000100), 0x6, 0xa01) 08:20:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 08:20:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000080)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x674, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "fe8166760e0233468be795857b177c27ac45dfd6c051a57b9f8a6569b02eb8eb"}]}, {0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private1}}]}, {0xb8, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "eed815a2bdc85b334c242cfb135f4d390fbc2540128790c98356ec9693fa0238"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "332c3acac2f1c61e5903700780025c92832a21b72bae65175b79144775514cf7"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @loopback}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x48, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x44, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}]}]}, {0x298, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x268, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}]}]}, {0x280, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x260, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast1}}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x82c, 0x8, 0x0, 0x1, [{0x358, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x34c, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}]}, @WGPEER_A_FLAGS={0x8}]}, {0x244, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "5d7ca4d04a71489c99040aeb30db55173c21b3b4b5fc7a629dba28e29fc9c9b7"}, @WGPEER_A_ALLOWEDIPS={0x1b4, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast1}}]}, {0x200, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast2}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d4018c826605890d0d4cd18bfa947793d2ec5c19e29d9f36f490df6a116dc44c"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast1}}, @WGPEER_A_ALLOWEDIPS={0x19c, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}]}, {0x2c, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private1}}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}]}]}]}]}, 0xec8}}, 0x0) 08:20:02 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:02 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000340)) 08:20:02 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000000c0)) 08:20:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 08:20:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, 0x1}, &(0x7f0000000040)=0x20) [ 411.811875][T14003] loop1: detected capacity change from 0 to 7 [ 411.918486][T14012] loop2: detected capacity change from 0 to 1 08:20:02 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:02 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffe000/0x1000)=nil, 0x9, 0x2, 0x44}) [ 412.089172][T14012] loop2: p2 < > p3 p4 [ 412.104195][T14012] loop2: partition table partially beyond EOD, truncated [ 412.186784][T14012] loop2: p2 size 2 extends beyond EOD, truncated [ 412.227863][T14012] loop2: p3 start 225 is beyond EOD, truncated [ 412.249816][T14012] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 412.294712][T14033] loop1: detected capacity change from 0 to 7 08:20:02 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:02 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 08:20:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 08:20:02 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x28300, 0x0) 08:20:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'macvlan1\x00'}) 08:20:02 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 412.662317][T14054] loop1: detected capacity change from 0 to 7 08:20:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x101}]}, 0x28}}, 0x0) 08:20:03 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) accept(r0, 0x0, 0x0) 08:20:03 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffc000/0x3000)=nil, 0xef}) [ 412.713508][T14060] loop2: detected capacity change from 0 to 1 08:20:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000180)) 08:20:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000)=0x7ff, 0x4) 08:20:03 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 412.970030][T14060] loop2: p2 < > p3 p4 [ 412.989342][T14060] loop2: partition table partially beyond EOD, truncated [ 413.041316][T14060] loop2: p2 size 2 extends beyond EOD, truncated [ 413.122039][T14060] loop2: p3 start 225 is beyond EOD, truncated [ 413.147566][T14060] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 413.195380][T14082] loop1: detected capacity change from 0 to 7 08:20:03 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 08:20:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 08:20:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 08:20:03 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, &(0x7f0000000040)) 08:20:03 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:03 executing program 5: syz_open_dev$dri(&(0x7f0000000080), 0x1, 0xc2c40) 08:20:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000080)=0x800, 0x4) 08:20:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syz_tun\x00'}) 08:20:04 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) [ 413.626742][T14109] loop1: detected capacity change from 0 to 7 [ 413.667473][T14115] loop2: detected capacity change from 0 to 1 08:20:04 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c", 0x811, 0x1000}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}], 0x0, &(0x7f0000000480)=ANY=[]) getdents(r0, &(0x7f0000002100)=""/80, 0x50) 08:20:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000002c0)=ANY=[], 0x28) [ 413.861301][T14131] loop2: p2 < > p3 p4 [ 413.865676][T14131] loop2: partition table partially beyond EOD, truncated [ 413.948710][T14135] loop4: detected capacity change from 0 to 512 [ 413.980791][T14135] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 414.013010][T14131] loop2: p2 size 2 extends beyond EOD, truncated [ 414.027890][T14135] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 414.055464][T14131] loop2: p3 start 225 is beyond EOD, truncated [ 414.063602][T14131] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 414.113219][T14115] loop2: p2 < > p3 p4 [ 414.118419][T14115] loop2: partition table partially beyond EOD, truncated [ 414.136635][T14115] loop2: p2 size 2 extends beyond EOD, truncated [ 414.148094][T14115] loop2: p3 start 225 is beyond EOD, truncated [ 414.159883][T14115] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 414.174445][ T2970] loop2: p2 < > p3 p4 [ 414.178590][ T2970] loop2: partition table partially beyond EOD, truncated 08:20:04 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000091"], 0x110}}], 0x2, 0x0) 08:20:04 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:04 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_int(r0, 0x29, 0x3a, 0x0, 0x0) 08:20:04 executing program 5: syz_open_dev$dri(&(0x7f0000000000), 0x4007, 0x240900) 08:20:04 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000240)={0x25}, &(0x7f0000000280)={0x1000}, 0x0, 0x0, 0x0) [ 414.204701][ T2970] loop2: p2 size 2 extends beyond EOD, truncated [ 414.212937][ T2970] loop2: p3 start 225 is beyond EOD, truncated [ 414.219119][ T2970] loop2: p4 size 3657465856 extends beyond EOD, truncated 08:20:04 executing program 5: pselect6(0x40, &(0x7f0000000100)={0x7fff}, 0x0, 0x0, 0x0, 0x0) 08:20:04 executing program 4: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000480), 0x200500, 0x0) 08:20:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[], 0xec8}}, 0x0) 08:20:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet6(r0, &(0x7f0000005900), 0x1, 0x0) [ 414.421682][T14172] loop1: detected capacity change from 0 to 7 [ 414.429020][T14176] loop2: detected capacity change from 0 to 1 08:20:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$inet6_int(r0, 0x29, 0x19, 0x0, &(0x7f0000000040)) 08:20:04 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 414.607785][T14176] loop2: p2 < > p3 p4 [ 414.623461][T14176] loop2: partition table partially beyond EOD, truncated [ 414.654575][T14176] loop2: p2 size 2 extends beyond EOD, truncated [ 414.723107][T14176] loop2: p3 start 225 is beyond EOD, truncated [ 414.772723][T14176] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 414.792926][T14198] loop1: detected capacity change from 0 to 7 [ 414.830424][ T2970] loop2: p2 < > p3 p4 [ 414.834641][ T2970] loop2: partition table partially beyond EOD, truncated [ 414.843503][ T2970] loop2: p2 size 2 extends beyond EOD, truncated [ 414.851990][ T2970] loop2: p3 start 225 is beyond EOD, truncated [ 414.859029][ T2970] loop2: p4 size 3657465856 extends beyond EOD, truncated 08:20:05 executing program 4: clock_gettime(0xdaefbf84e4d57f5e, 0x0) 08:20:05 executing program 0: syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x44c40) 08:20:05 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000003e40)={&(0x7f0000002a00)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000003d00)=[{&(0x7f0000002a40)="a255d09fcd6ad4696e8a383c08ccd194dc76df054f95a63bf4a6ed867f27b31254a6b1dd9f65aaddee60d7c61a034651c1badda8e8dc97f67b3715317aed39d3465f28208f1a9245e71c59dbbdad82bbed6ca4a28f219ce93ce267494c6e4ca340f6079093275749", 0x68}, {&(0x7f0000002ac0)="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", 0x971}], 0x2, &(0x7f0000003e00)=[@rights], 0x28}, 0x0) 08:20:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) 08:20:05 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:05 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_FAMILY={0x6}]}, 0xfffffd84}}, 0x0) 08:20:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000006c0)={'NETMAP\x00'}, &(0x7f0000000700)=0x1e) 08:20:05 executing program 0: syz_mount_image$squashfs(&(0x7f0000000280), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000010000)="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", 0x751}, {0x0, 0x0, 0x8002}], 0x0, &(0x7f0000000240)) 08:20:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000500)={'wg2\x00'}) [ 415.107927][T14225] loop2: detected capacity change from 0 to 1 [ 415.137092][T14226] loop1: detected capacity change from 0 to 7 08:20:05 executing program 4: pselect6(0x0, 0xfffffffffffffffc, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 08:20:05 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000100)={&(0x7f0000ffc000/0x3000)=nil}) 08:20:05 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 415.234724][T14225] loop2: p2 < > p3 p4 [ 415.243449][T14225] loop2: partition table partially beyond EOD, truncated [ 415.270875][T14225] loop2: p2 size 2 extends beyond EOD, truncated 08:20:05 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) getsockname$inet6(r0, 0x0, &(0x7f0000000040)) [ 415.328202][T14225] loop2: p3 start 225 is beyond EOD, truncated [ 415.347225][T14225] loop2: p4 size 3657465856 extends beyond EOD, truncated 08:20:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}, 0x1c) [ 415.629973][T14260] loop1: detected capacity change from 0 to 7 08:20:06 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:06 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) pselect6(0x40, &(0x7f0000000240)={0x25}, &(0x7f0000000280)={0x1000}, 0x0, 0x0, 0x0) 08:20:06 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000180)=0x54) 08:20:06 executing program 3: r0 = socket(0x18, 0x0, 0x3) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 08:20:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x7}, 0x1c, 0x0, 0x0, &(0x7f0000000840)=[@rthdr={{0x18}}], 0x18}}], 0x1, 0x0) 08:20:06 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0x0) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:06 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000300)) 08:20:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 08:20:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[], 0x4c}}, 0x0) 08:20:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 08:20:06 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{}, 'port1\x00'}) [ 415.936612][T14285] loop2: detected capacity change from 0 to 1 08:20:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[], 0x4c}}, 0x0) [ 416.011775][T14289] loop1: detected capacity change from 0 to 7 [ 416.050481][T14285] loop2: p2 < > p3 p4 [ 416.054708][T14285] loop2: partition table partially beyond EOD, truncated [ 416.085065][T14285] loop2: p2 size 2 extends beyond EOD, truncated [ 416.153112][T14285] loop2: p3 start 225 is beyond EOD, truncated [ 416.181054][T14285] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 416.359593][ T2970] loop2: p2 < > p3 p4 [ 416.364171][ T2970] loop2: partition table partially beyond EOD, truncated [ 416.375031][ T2970] loop2: p2 size 2 extends beyond EOD, truncated [ 416.383725][ T2970] loop2: p3 start 225 is beyond EOD, truncated [ 416.392096][ T2970] loop2: p4 size 3657465856 extends beyond EOD, truncated 08:20:06 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_read_part_table(0x10, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:06 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, 0x0) 08:20:06 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000400)) 08:20:06 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0x0) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000240)=0x8, 0x4) 08:20:06 executing program 3: openat$null(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) 08:20:07 executing program 3: syslog(0x2, &(0x7f0000000100)=""/123, 0x7b) 08:20:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x7}, 0x1c, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 08:20:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000580)="fb9c", 0xfffff, r2) 08:20:07 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{}, {0x5}}) [ 416.654322][T14329] loop1: detected capacity change from 0 to 7 [ 416.727597][T14334] loop2: detected capacity change from 0 to 1 08:20:07 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0x0) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) [ 416.858972][T14334] loop2: p2 < > p3 p4 [ 416.866104][T14334] loop2: partition table partially beyond EOD, truncated [ 416.911582][T14334] loop2: p2 size 2 extends beyond EOD, truncated [ 416.969143][T14334] loop2: p3 start 225 is beyond EOD, truncated [ 416.993239][T14334] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 417.087813][T14355] loop1: detected capacity change from 0 to 7 [ 417.295250][T14341] loop2: detected capacity change from 0 to 7 08:20:07 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:07 executing program 4: openat$drirender128(0xffffffffffffff9c, 0x0, 0x200500, 0x0) 08:20:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000080), 0x4) 08:20:07 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 08:20:07 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000180)={{}, 'port1\x00'}) 08:20:07 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(0x0, 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:07 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000080)) 08:20:07 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 08:20:08 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000000c0)="ca", 0x1}, {&(0x7f00000002c0)="f4", 0x1}, {&(0x7f0000000380)="9f", 0x1}], 0x3}, 0x0) [ 417.579309][T14379] loop1: detected capacity change from 0 to 7 08:20:08 executing program 3: socket(0x2, 0x1, 0x3) [ 417.674909][T14388] loop2: detected capacity change from 0 to 7 08:20:08 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(0x0, 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:08 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0xfffffffffffffffb]}, 0x8}) [ 417.954749][T14412] loop1: detected capacity change from 0 to 7 08:20:08 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:08 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 08:20:08 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) 08:20:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000040)) 08:20:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @cond}}) 08:20:08 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(0x0, 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000240)={0xdf, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:20:08 executing program 5: getgroups(0x1, &(0x7f0000000280)=[0xee00]) [ 418.297818][T14427] loop1: detected capacity change from 0 to 7 08:20:08 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 08:20:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000300), 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00'}, 0x45c) [ 418.356542][T14433] loop2: detected capacity change from 0 to 7 08:20:08 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:08 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) [ 418.617441][T14451] loop1: detected capacity change from 0 to 7 08:20:09 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:09 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0xe2e00e5501e1f610, 0x0) 08:20:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc, 0x99, {0x0, 0x2}}}}}, 0x20}}, 0x0) 08:20:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) 08:20:09 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x200007a) 08:20:09 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:09 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 08:20:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f00000000c0)) 08:20:09 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f00000002c0)) 08:20:09 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000002c0)={@private2}, 0x14) [ 418.990727][T14471] loop1: detected capacity change from 0 to 7 [ 419.024570][T14474] loop2: detected capacity change from 0 to 7 08:20:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_int(r0, 0x29, 0x7, 0x0, 0x0) 08:20:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000), 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) 08:20:09 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:09 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:09 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) 08:20:09 executing program 4: setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) 08:20:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) recvfrom$inet6(r0, 0x0, 0x0, 0x10001, 0x0, 0x0) 08:20:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000001180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000001300)) syz_genetlink_get_family_id$batadv(&(0x7f0000000fc0), r0) 08:20:09 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 08:20:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) 08:20:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000080), 0x1, 0xc2c40) [ 419.376943][T14502] loop2: detected capacity change from 0 to 7 [ 419.416399][T14506] loop1: detected capacity change from 0 to 7 08:20:09 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace$pokeuser(0x6, 0x0, 0x5, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040), 0x6) ioctl$sock_bt_hci(r0, 0x400448e7, &(0x7f0000000080)) 08:20:09 executing program 4: r0 = perf_event_open(&(0x7f0000001600)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002940)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/udp6\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0xf0ff7f, 0x0) writev(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 08:20:09 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(0x0, &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:10 executing program 5: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='V', 0x1, 0xfffffffffffffffb) keyctl$setperm(0x9, r0, 0xfffffffb) [ 419.661642][T14529] loop2: detected capacity change from 0 to 7 08:20:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, 0x0) 08:20:10 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) [ 419.811405][T14539] loop1: detected capacity change from 0 to 7 08:20:10 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='comm\x00') sendfile(r0, r1, 0x0, 0x24002da8) [ 420.034574][T14553] loop2: detected capacity change from 0 to 7 08:20:10 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)) 08:20:10 executing program 4: r0 = perf_event_open(&(0x7f0000001600)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002940)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/udp6\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0xf0ff7f, 0x0) writev(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 08:20:10 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(0x0, &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000e00)=[{{&(0x7f00000009c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x35}}}}, 0x80, 0x0}}], 0x1, 0x400c4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private0, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x1, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x8000000000001f4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) 08:20:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, 0x0, 0x20000800) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) connect$inet6(r0, &(0x7f0000000e40)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0x7ff}, 0x1c) 08:20:10 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000380), 0x4) 08:20:10 executing program 0: add_key$fscrypt_v1(&(0x7f00000013c0), &(0x7f0000001400)={'fscrypt:', @auto=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x63]}, &(0x7f0000001440)={0x0, "085de91666fea8c300061f1f2c293b479e921089d9b016539acae79658b99a2a23eed3323ed11b6fd9c99677f23ea6f703765bc7b0abc7f24cb44314b4d75668"}, 0x48, 0xfffffffffffffffd) [ 420.554827][T14574] loop2: detected capacity change from 0 to 7 [ 420.562248][T14576] loop1: detected capacity change from 0 to 7 08:20:11 executing program 4: r0 = perf_event_open(&(0x7f0000001600)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002940)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/udp6\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0xf0ff7f, 0x0) writev(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 08:20:11 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(0x0, &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) fstat(r0, &(0x7f0000000000)) 08:20:11 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0), 0x1c5062, 0x0) [ 420.992984][T14604] loop1: detected capacity change from 0 to 7 08:20:11 executing program 0: socketpair(0x11, 0x2, 0x5, 0x0) 08:20:11 executing program 4: r0 = perf_event_open(&(0x7f0000001600)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002940)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/udp6\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0xf0ff7f, 0x0) writev(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 08:20:11 executing program 5: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 08:20:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001b80)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) 08:20:11 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), 0x0, 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001b80)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) 08:20:11 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f00000088c0)='/proc/key-users\x00', 0x0, 0x0) 08:20:11 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000005300), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000000100)={0x2, 0x0, 0x0}) [ 421.419348][T14623] loop1: detected capacity change from 0 to 7 08:20:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x0, &(0x7f0000000000)}) 08:20:11 executing program 0: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f00000010c0)="b805000000b9000000000f01c166bad104ed0f0666660f3881b357f2e46f660f72e5010f4bb6006000000f01d10f20e035200000000f22e02e0fc77d69c4c2a1075800"}], 0xaaaaaaaaaaaac7d, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"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"}) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) 08:20:12 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), 0x0, 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x18, 0x0, "cc2e396859c54c133c26a98658734a25311baaef1c827f85da5ae12d727c2330b1d87a2df7ab6ade36af1fb50acd3a3470434d74a75c05ec5515cf37c8ad9eed90db6a690dae2793b779a09b24895f06"}, 0xd8) 08:20:12 executing program 3: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 08:20:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000280)) [ 421.707331][T14643] loop1: detected capacity change from 0 to 7 08:20:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000e40)={0xa, 0x0, 0x0, @local}, 0x1c) 08:20:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) [ 421.901258][T14656] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=1812281087 (231971979136 ns) > initial count (128 ns). Using initial count to start timer. 08:20:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 08:20:12 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) [ 422.181120][T14634] loop2: detected capacity change from 0 to 7 08:20:12 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:12 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), 0x0, 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:12 executing program 4: syz_open_dev$dri(&(0x7f0000005300), 0x0, 0x2d8d40) 08:20:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto, @int]}}, &(0x7f00000005c0)=""/229, 0x1000000, 0xe5, 0x1}, 0x20) 08:20:12 executing program 3: clock_gettime(0x1, &(0x7f0000000000)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 08:20:12 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000041c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) 08:20:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001b80)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:20:12 executing program 5: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000012440), 0x2, 0x0) 08:20:12 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000001a80), 0x400, 0x0) [ 422.480320][T14686] loop1: detected capacity change from 0 to 7 08:20:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000140)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) 08:20:13 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000e40)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0x7ff}, 0x1c) [ 422.838055][T14708] loop1: detected capacity change from 0 to 7 [ 422.921422][T13139] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 423.122860][T14688] loop2: detected capacity change from 0 to 7 08:20:13 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:13 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) pread64(r0, 0x0, 0x0, 0x0) 08:20:13 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) 08:20:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000002680)=ANY=[], 0x124}}, 0x0) 08:20:13 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:13 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f00000088c0)='/proc/key-users\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000008940), 0x0) 08:20:13 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x2, 0x0, 0x0) 08:20:13 executing program 3: add_key$fscrypt_v1(&(0x7f00000013c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 08:20:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f0000000780)) 08:20:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x10132) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)=""/16, &(0x7f0000000100)=0x10) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, 0xffffffffffffffff, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x80082102, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf401}, 0x1c) [ 423.377969][T14727] loop1: detected capacity change from 0 to 7 08:20:13 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000006780), 0xc000, 0x0) 08:20:13 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 423.694428][T14751] loop1: detected capacity change from 0 to 7 [ 423.896541][T14734] loop2: detected capacity change from 0 to 7 08:20:14 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="50000000080605"], 0x50}}, 0x0) 08:20:14 executing program 0: add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 08:20:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000080)=0x400, 0x4) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) write$binfmt_elf64(r0, &(0x7f0000000600)=ANY=[], 0xfc30) 08:20:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x10132) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)=""/16, &(0x7f0000000100)=0x10) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, 0xffffffffffffffff, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x80082102, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf401}, 0x1c) 08:20:14 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x0, 0x0, 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:14 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000140)) 08:20:14 executing program 3: syz_open_dev$dri(&(0x7f0000005300), 0x6a94, 0x0) [ 424.170522][T14778] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.5'. 08:20:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x10132) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)=""/16, &(0x7f0000000100)=0x10) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, 0xffffffffffffffff, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x80082102, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf401}, 0x1c) [ 424.220899][T14779] loop2: detected capacity change from 0 to 7 08:20:14 executing program 5: keyctl$update(0x2, 0x0, &(0x7f00000015c0)='t', 0x1) 08:20:14 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x0, 0x0, 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:14 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)={0x0, "08f6c728ebc16acef3b51f835c220de719e1318a8f96465a667c4961921fbcdda9c37605b13989c30c2b47a96046f2ab4b565093d98771b83bed26b60cbb4bd1"}, 0x48, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r0, 0x3f) 08:20:14 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:14 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) 08:20:14 executing program 5: keyctl$update(0x2, 0x0, &(0x7f00000015c0)='t', 0x1) 08:20:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x10132) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)=""/16, &(0x7f0000000100)=0x10) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, 0xffffffffffffffff, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x80082102, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf401}, 0x1c) 08:20:14 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x0, 0x0, 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:15 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)={0x0, "08f6c728ebc16acef3b51f835c220de719e1318a8f96465a667c4961921fbcdda9c37605b13989c30c2b47a96046f2ab4b565093d98771b83bed26b60cbb4bd1"}, 0x48, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r0, 0x3f) 08:20:15 executing program 0: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 08:20:15 executing program 5: keyctl$update(0x2, 0x0, &(0x7f00000015c0)='t', 0x1) [ 424.675590][T14803] loop2: detected capacity change from 0 to 7 08:20:15 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)={0x0, "08f6c728ebc16acef3b51f835c220de719e1318a8f96465a667c4961921fbcdda9c37605b13989c30c2b47a96046f2ab4b565093d98771b83bed26b60cbb4bd1"}, 0x48, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r0, 0x3f) 08:20:15 executing program 5: keyctl$update(0x2, 0x0, &(0x7f00000015c0)='t', 0x1) 08:20:15 executing program 0: syz_open_dev$dri(&(0x7f0000005300), 0x0, 0x41) 08:20:15 executing program 4: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in=@empty}}, {{@in6=@dev}, 0x0, @in=@initdev}}, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x26003, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000e40)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 08:20:15 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:15 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:15 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)={0x0, "08f6c728ebc16acef3b51f835c220de719e1318a8f96465a667c4961921fbcdda9c37605b13989c30c2b47a96046f2ab4b565093d98771b83bed26b60cbb4bd1"}, 0x48, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r0, 0x3f) 08:20:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 08:20:15 executing program 5: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f0000000100)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='io.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) tkill(r0, 0x15) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:20:15 executing program 0: socketpair(0x18, 0x0, 0x8, 0x0) 08:20:15 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f00000013c0), &(0x7f0000001400)={'fscrypt:', @auto=[0x57, 0x66, 0x61, 0x0, 0x37, 0x35]}, &(0x7f0000001440)={0x0, "085de91666fea8c300061f1f2c293b479e921089d9b016539acae79658b99a2a23eed3323ed11b6fd9c99677f23ea6f703765bc7b0abc7f24cb44314b4d75668"}, 0x48, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f00000015c0)='t', 0x1) 08:20:15 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000005300), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x8, 0x2) 08:20:15 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x331, 0x74000000, 0x0) [ 425.301739][T14837] loop1: detected capacity change from 0 to 4 [ 425.365683][T14845] loop2: detected capacity change from 0 to 7 08:20:15 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:15 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400), 0x84080, 0x0) 08:20:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="5000000008060500000000"], 0x50}, 0x1, 0x0, 0x0, 0x4004809}, 0x0) [ 425.677770][T14867] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. [ 425.682593][T14865] loop1: detected capacity change from 0 to 4 08:20:16 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:16 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000680)) 08:20:16 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000000)="b5", 0x1) 08:20:16 executing program 0: socket$inet6(0x18, 0x3, 0x2) 08:20:16 executing program 4: accept$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x0) 08:20:16 executing program 4: open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 08:20:16 executing program 0: setitimer(0x0, &(0x7f0000000080), 0x0) 08:20:16 executing program 3: socket$inet(0x2, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x10000, 0x0) 08:20:16 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:16 executing program 5: setitimer(0x0, &(0x7f0000000080)={{}, {0x0, 0x3f}}, &(0x7f00000000c0)) [ 425.931171][T14885] loop2: detected capacity change from 0 to 7 08:20:16 executing program 3: socket$inet(0x2, 0x0, 0x22) 08:20:16 executing program 0: setitimer(0x1, &(0x7f0000000080)={{0xbde0}, {0x0, 0x3f}}, &(0x7f00000000c0)) [ 426.107745][T14901] loop1: detected capacity change from 0 to 4 08:20:16 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:16 executing program 4: socket$inet(0x2, 0x0, 0x22) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet6(0x18, 0x3, 0x0) 08:20:16 executing program 5: r0 = socket$inet6(0x18, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000180)=0xc) 08:20:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$can_raw(0x1d, 0x3, 0x1) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="5000000010000b0400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a000100767863616e000000180002801400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008000a00d3"], 0x50}}, 0x0) 08:20:16 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {0x0, 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:16 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a080000000100000112", 0x65, 0x8b000}], 0x0, &(0x7f000001fa00)) getdents(r0, &(0x7f0000000040)=""/176, 0xb0) 08:20:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x6}}}}}}, 0x0) [ 426.508122][T14927] loop3: detected capacity change from 0 to 2224 [ 426.524981][T14923] loop1: detected capacity change from 0 to 7 [ 426.534059][T14932] loop2: detected capacity change from 0 to 7 08:20:17 executing program 3: r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), r0) 08:20:17 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) 08:20:17 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {0x0, 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) 08:20:17 executing program 5: r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, 0x0) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, 0x0) [ 426.929515][ T26] audit: type=1326 audit(1639124417.296:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14964 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7fc00000 [ 426.963408][T14972] loop1: detected capacity change from 0 to 7 08:20:17 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = userfaultfd(0x80001) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000950000/0x18000)=nil, &(0x7f00000004c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) dup2(r3, r2) 08:20:17 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)) 08:20:17 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {0x0, 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 427.242695][T14989] loop2: detected capacity change from 0 to 7 08:20:17 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = userfaultfd(0x80001) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000950000/0x18000)=nil, &(0x7f00000004c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) dup2(r3, r2) [ 427.453158][T15003] loop1: detected capacity change from 0 to 7 [ 427.552674][T15010] loop2: detected capacity change from 0 to 7 08:20:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004580)={0x0, 0x0, &(0x7f0000004540)={&(0x7f0000004500)=@getnexthop={0x20, 0x6a, 0x413, 0x0, 0x0, {}, [@NHA_MASTER={0x3}]}, 0x20}}, 0x0) 08:20:18 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380)}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 427.636653][ T26] audit: type=1326 audit(1639124418.006:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14964 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fe0d3a5cb49 code=0x7fc00000 [ 427.722097][ T26] audit: type=1326 audit(1639124418.006:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14964 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7fc00000 [ 427.753935][T15026] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 427.803622][ T26] audit: type=1326 audit(1639124418.006:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14964 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7fc00000 [ 427.861862][T15027] loop1: detected capacity change from 0 to 4 [ 427.877036][ T26] audit: type=1326 audit(1639124418.006:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14964 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7fc00000 [ 427.903474][ T26] audit: type=1326 audit(1639124418.006:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14964 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7fc00000 [ 427.931324][ T26] audit: type=1326 audit(1639124418.006:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14964 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7fc00000 [ 428.001238][ T26] audit: type=1326 audit(1639124418.006:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14964 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7fc00000 [ 428.044689][ T26] audit: type=1326 audit(1639124418.006:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14964 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7fc00000 [ 428.069878][ T26] audit: type=1326 audit(1639124418.006:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14964 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7fc00000 08:20:18 executing program 4: io_uring_setup(0x1153, &(0x7f0000000080)) 08:20:18 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 08:20:18 executing program 3: set_mempolicy(0x1, 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 08:20:18 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380)}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:18 executing program 5: r0 = fsopen(&(0x7f0000000740)='exfat\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000780)='-\x00', &(0x7f00000007c0)='./file0\x00', 0xffffffffffffffff) 08:20:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001180), 0x1008000, &(0x7f0000001340)={[{}, {@fat=@dmask}, {@utf8}, {@shortname_mixed}, {@fat=@nfs}], [{@smackfshat={'smackfshat', 0x3d, '-$'}}]}) 08:20:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) [ 428.356806][T15041] loop1: detected capacity change from 0 to 4 08:20:18 executing program 5: userfaultfd(0xc01) 08:20:19 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:19 executing program 4: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x4002) 08:20:19 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000a40)='ns/pid_for_children\x00') 08:20:19 executing program 3: process_vm_writev(0x0, &(0x7f0000001640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 08:20:19 executing program 0: setreuid(0x0, 0xee00) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 08:20:19 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380)}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:19 executing program 0: setresuid(0x0, 0x0, 0xee00) setreuid(0x0, 0xee00) 08:20:19 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x541b, 0x0) 08:20:19 executing program 3: getrlimit(0x746935a27f70d817, 0x0) 08:20:19 executing program 4: keyctl$KEYCTL_MOVE(0xe, 0x0, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x0) [ 428.850170][T15076] loop1: detected capacity change from 0 to 4 [ 428.880661][T15080] loop2: detected capacity change from 0 to 7 08:20:19 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x248000, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 08:20:19 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:19 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 08:20:19 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000004480)=[{&(0x7f00000032c0)='A', 0x1}, {&(0x7f0000003380)="dab2e70a3537d595ff20bc72b7d246a4d435a36a5f2c8da27aff7a6fc43ec5a1c2b61afb86f3da2135a6d63b3538d519f071f22243f87ea0b611be997da005ead2294476e713ba75f6a385faa37924f20cc8291f2aa94ba50f7d0033333c6bd8c2ec724d481bf2e2fcda20cb398c096a633e60e4730919df3ca0b5fb5c2ed19bb603d60c901ba06bd84c", 0x8a, 0x6}], 0x0, 0x0) 08:20:19 executing program 4: bpf$BPF_LINK_UPDATE(0x21, &(0x7f0000000040), 0x10) 08:20:19 executing program 0: prctl$PR_SET_KEEPCAPS(0x8, 0x4) [ 429.094835][T15098] loop1: detected capacity change from 0 to 7 08:20:19 executing program 4: mlockall(0x3) fsmount(0xffffffffffffffff, 0x0, 0x0) mlockall(0x1) 08:20:19 executing program 3: ioprio_set$uid(0x0, 0x0, 0x6004) 08:20:19 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000600)={'erspan0\x00', &(0x7f0000000580)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0xffff5324, 0x8001, {{0x17, 0x4, 0x1, 0x4, 0x5c, 0x64, 0x0, 0x1, 0x2f, 0x0, @broadcast, @broadcast, {[@cipso={0x86, 0x31, 0x0, [{0x1, 0x12, "04aa40343bbbb71ac0f3ce11586bd4d9"}, {0x0, 0x12, "e52aa9de291af1e81e4d1721a6a0e771"}, {0x6, 0x7, "217abfcd87"}]}, @lsrr={0x83, 0x13, 0x48, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @ra={0x94, 0x4}]}}}}}) ftruncate(0xffffffffffffffff, 0x2006fff) [ 429.347388][T15120] loop2: detected capacity change from 0 to 7 08:20:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000003f40)=0x7, 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000004040), r0) 08:20:19 executing program 3: futex(&(0x7f0000000000)=0x1, 0x6, 0x0, &(0x7f00000000c0), 0x0, 0x0) 08:20:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @rand_addr=' \x01\x00'}}) [ 429.589748][T15137] loop1: detected capacity change from 0 to 7 08:20:20 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:20 executing program 3: setreuid(0xee01, 0xffffffffffffffff) 08:20:20 executing program 5: keyctl$KEYCTL_MOVE(0x11, 0x0, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x0) 08:20:20 executing program 0: mount$binderfs(0x0, &(0x7f00000001c0)='./binderfs\x00', &(0x7f0000000180), 0x0, &(0x7f00000000c0)={[], [{@smackfsdef={'smackfsdef', 0x3d, ']\xba'}}]}) 08:20:20 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000280)={0xe84, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xe14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x101, 0x4, "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"}, @ETHTOOL_A_BITSET_BITS={0x78, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '{+%}$.\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\'\'.{:-\xf8\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0xad, 0x4, "8c380c1659d798755c30cb0349e3edc3ce89381bc66d46eac002529a3547443c8cc7e44610ba5d3e60c0f1080a1d11c3f3795471f46a1a9bb0cc085e932a16e8a7fcc261aa7bdb76c5a8df9a8066fe7f2bb93cbdfced182d26d5ab58cff53bcd4d7ef1123ca82723c23fac38c13277f8b5bc2401ab232c4b2c2743c93a20edbf1c2fd75637f30f8d97e9a35f3b683cdfad1b7da08650533a542e402dd38890203ee6735f95c678d263"}, @ETHTOOL_A_BITSET_MASK={0xbd9, 0x5, "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"}]}]}, 0xe84}}, 0x0) 08:20:20 executing program 3: socket$packet(0x11, 0x18cc188f2ff59402, 0x300) 08:20:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000003240)={0x0, 0x0}) [ 430.273252][T15165] loop2: detected capacity change from 0 to 7 [ 430.291640][T15166] binder: Unknown parameter 'smackfsdef' 08:20:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000003200)={0x2, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4}, 0x40) [ 430.318128][T15162] loop1: detected capacity change from 0 to 7 [ 430.331078][T15166] binder: Unknown parameter 'smackfsdef' 08:20:20 executing program 0: mount$binderfs(0x0, &(0x7f00000001c0)='./binderfs\x00', &(0x7f0000000180), 0x0, &(0x7f00000000c0)) 08:20:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000500)={0x81220000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/137, &(0x7f0000000300)=[0xffffffffffffffff], 0x1}, 0x58) close(r0) 08:20:20 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {0x0, 0x0, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:21 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000480)={0x0, 0x1, &(0x7f0000000380)="8f"}) 08:20:21 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:21 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) 08:20:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) [ 430.571629][T15187] loop1: detected capacity change from 0 to 7 08:20:21 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {0x0, 0x0, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:21 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x10042, 0x0) syz_mount_image$vfat(&(0x7f0000003240), &(0x7f0000003280)='./file0\x00', 0x0, 0x0, &(0x7f0000004480), 0x0, &(0x7f0000004500)={[{@rodir}, {@numtail}, {@numtail}, {@uni_xlateno}, {@shortname_win95}], [{@subj_role={'subj_role', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}]}) 08:20:21 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0, 0x0, 0x1c}, 0x10) 08:20:21 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x21a002, 0x0) [ 430.880787][T15199] loop2: detected capacity change from 0 to 7 08:20:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)={0x20, r1, 0xced1b5e4a7ac5b29, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xa1551289b69eae0f}]}]}, 0x20}}, 0x0) [ 431.062553][T15212] loop1: detected capacity change from 0 to 7 08:20:21 executing program 4: keyctl$KEYCTL_MOVE(0x19, 0x0, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x0) 08:20:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000500)={0x81220000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/137, &(0x7f0000000300)=[0xffffffffffffffff], 0x1}, 0x58) close(r0) 08:20:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x4020940d, &(0x7f00000002c0)={'syztnl2\x00', 0x0}) [ 431.549246][ T6601] Bluetooth: hci5: command 0x0406 tx timeout 08:20:21 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}]}, 0x34}}, 0x0) 08:20:21 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {0x0, 0x0, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:21 executing program 0: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x0) 08:20:22 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f00000012c0)=0xffffffffffffffff, 0x4) 08:20:22 executing program 0: bpf$BPF_LINK_UPDATE(0x1b, 0x0, 0x0) 08:20:22 executing program 4: r0 = add_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='?', 0x1, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000480), 0x0, 0x0, 0x0, r0) [ 431.765424][T15242] loop1: detected capacity change from 0 to 7 [ 431.792725][T15244] loop2: detected capacity change from 0 to 7 08:20:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000002d40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002c00)=[{{&(0x7f0000000180)=@xdp, 0x80, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x2100, &(0x7f0000002d80)={0x0, r1+60000000}) 08:20:22 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0), 0x0, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8920, &(0x7f00000002c0)={'syztnl2\x00', 0x0}) 08:20:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000500)={0x81220000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/137, &(0x7f0000000300)=[0xffffffffffffffff], 0x1}, 0x58) close(r0) 08:20:22 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x840000, 0x0) 08:20:22 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:22 executing program 5: mount$binderfs(0x0, &(0x7f0000000140)='./binderfs\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)={[], [{@context={'context', 0x3d, 'root'}}]}) 08:20:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, 0x0, 0x0) [ 432.444148][T15272] binder: Unknown parameter 'context' [ 432.450221][T15270] loop1: detected capacity change from 0 to 7 [ 432.459320][T15272] binder: Unknown parameter 'context' 08:20:22 executing program 4: mount$binderfs(0x0, &(0x7f00000001c0)='./binderfs\x00', &(0x7f0000000180), 0x0, &(0x7f00000000c0)={[{@stats}, {@max={'max', 0x3d, 0x400}}]}) 08:20:22 executing program 5: bpf$ITER_CREATE(0x21, &(0x7f0000001000), 0x8) [ 432.542665][T15274] loop2: detected capacity change from 0 to 7 08:20:23 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000000740)={&(0x7f0000000280), 0xc, &(0x7f0000000700)={&(0x7f0000000780)=ANY=[@ANYBLOB="58010000", @ANYRES16=r0, @ANYBLOB="01002dbd7000fbdbdf2512000000080006"], 0x158}}, 0x0) 08:20:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000500)={0x81220000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/137, &(0x7f0000000300)=[0xffffffffffffffff], 0x1}, 0x58) close(r0) 08:20:23 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0), 0x0, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:23 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000040)=""/214, 0xd6}], 0x1, &(0x7f0000001840)=[{0x0}, {0x0}, {&(0x7f0000000600)=""/119, 0x77}], 0x3, 0x0) 08:20:23 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x200}, 0x0, 0x0, 0x0) [ 432.811753][T15295] netlink: 316 bytes leftover after parsing attributes in process `syz-executor.0'. [ 432.851705][T15298] netlink: 316 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:23 executing program 5: r0 = fsopen(&(0x7f0000000740)='exfat\x00', 0x0) fsmount(r0, 0x0, 0x0) 08:20:23 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() r1 = geteuid() r2 = geteuid() setresuid(r2, r1, 0x0) setresuid(0xffffffffffffffff, 0xffffffffffffffff, r0) [ 432.992009][T15303] loop1: detected capacity change from 0 to 7 08:20:23 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:23 executing program 5: clock_nanosleep(0x0, 0x1, &(0x7f0000000200), 0x0) 08:20:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000c40), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000d40)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x2c}}, 0x0) 08:20:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local}}) 08:20:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001340)) 08:20:23 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0), 0x0, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:23 executing program 4: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000001300), 0xffffffffffffffff) 08:20:23 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f00000001c0), {}, 0x0, 0x0, &(0x7f0000000200)=""/137, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) close(r0) 08:20:23 executing program 3: setgid(0xee00) setregid(0x0, 0xee00) 08:20:23 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0) [ 433.335471][T15321] loop1: detected capacity change from 0 to 7 [ 433.453603][T15328] loop2: detected capacity change from 0 to 7 08:20:24 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f51", 0x22, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000140)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x3c}}, 0x0) [ 433.929085][T15350] loop1: detected capacity change from 0 to 7 08:20:24 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:24 executing program 3: getgroups(0x1, &(0x7f00000001c0)=[0xee00]) 08:20:24 executing program 0: request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) 08:20:24 executing program 4: setresuid(0xffffffffffffffff, 0xee01, 0x0) 08:20:24 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f51", 0x22, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000c40), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x3c}}, 0x0) 08:20:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) 08:20:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001180), 0x1008000, &(0x7f0000001340)) 08:20:25 executing program 4: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000003240)={0x5, &(0x7f0000003200)=[{0xff91}, {0x8, 0x0, 0x7f}, {}, {0x0, 0x7}, {0x0, 0x0, 0x0, 0xd385}]}) 08:20:25 executing program 3: mount$binderfs(0x0, &(0x7f00000000c0)='./binderfs\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB=',ro']) [ 434.716646][T15368] loop1: detected capacity change from 0 to 7 [ 434.717546][T15371] loop2: detected capacity change from 0 to 7 08:20:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000004bc0)="9d9ad48794543d24534b8db6e7f9e137", 0x10) 08:20:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000640)=@proc, 0xc) 08:20:25 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f00000006c0)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000600)=[{&(0x7f00000002c0)="d6e9", 0xffeb}], 0x1, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}, @ip_tos_int={{0x14, 0x8b01}}], 0x38}, 0x0) 08:20:25 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f51", 0x22, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@ipv6_delrule={0x2c, 0x21, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8}, @FIB_RULE_POLICY=@FRA_TABLE={0x8, 0xf, 0x1ff}]}, 0x2c}}, 0x0) 08:20:25 executing program 3: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@timestamp], 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) 08:20:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000200)) 08:20:25 executing program 5: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) fsmount(r0, 0x0, 0x0) 08:20:25 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setresuid(0xffffffffffffffff, 0xffffffffffffffff, r0) 08:20:25 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x2080) 08:20:25 executing program 3: getrandom(&(0x7f0000000100)=""/51, 0x33, 0x0) [ 435.389258][T15414] loop1: detected capacity change from 0 to 7 [ 435.396996][T15418] loop2: detected capacity change from 0 to 7 08:20:25 executing program 0: keyctl$KEYCTL_MOVE(0x9, 0x0, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x0) 08:20:25 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898", 0x33, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 435.666473][T15439] loop1: detected capacity change from 0 to 7 08:20:26 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:26 executing program 5: sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x0, 0x0, 0xffffc86a}, 0x0) 08:20:26 executing program 3: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x856274e525359b3d}, 0x10) 08:20:26 executing program 4: r0 = fsopen(&(0x7f0000000740)='exfat\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000001000)='!@\x00', &(0x7f0000002040)='./file0\x00', 0xffffffffffffff9c) 08:20:26 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x80000001, 0x3, &(0x7f0000004480)=[{&(0x7f0000003380)="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", 0xffb, 0x6}, {0x0, 0x0, 0xe000}, {&(0x7f0000004440)="d7", 0x1}], 0x0, 0x0) 08:20:26 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898", 0x33, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:26 executing program 0: request_key(&(0x7f0000000000)='ceph\x00', 0x0, 0x0, 0xfffffffffffffffa) 08:20:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDRT(r0, 0x80108907, 0x0) [ 435.966409][T15453] loop2: detected capacity change from 0 to 7 08:20:26 executing program 3: pselect6(0x40, &(0x7f0000000140)={0x100}, &(0x7f0000000180)={0x200}, &(0x7f0000000200)={0x8000}, &(0x7f0000000240)={0x0, 0x3938700}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x3f]}, 0x8}) 08:20:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x4, r1, r0, 0x0, 0x0) [ 436.031674][T15455] loop1: detected capacity change from 0 to 7 08:20:26 executing program 0: clock_gettime(0x0, &(0x7f00000001c0)) fork() getpid() 08:20:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000002c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:20:26 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@bridge_getneigh={0x1e, 0x1e, 0x20b}, 0x20}}, 0x0) 08:20:26 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898", 0x33, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:26 executing program 4: bpf$BPF_LINK_UPDATE(0x14, &(0x7f0000000040), 0x10) 08:20:26 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() r1 = geteuid() setresuid(r1, r0, 0x0) setresuid(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x4cc, 0x1}, 0x40) 08:20:26 executing program 5: r0 = fsopen(&(0x7f0000000740)='exfat\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 08:20:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80) recvmsg$can_bcm(r1, 0x0, 0x0) 08:20:26 executing program 4: process_vm_writev(0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)=""/214, 0xd6}], 0x1, 0x0, 0x0, 0x0) 08:20:27 executing program 3: request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0) [ 436.635059][T15495] loop1: detected capacity change from 0 to 7 [ 436.635118][T15493] loop2: detected capacity change from 0 to 7 08:20:27 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3", 0x3b, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5421, &(0x7f00000002c0)={'syztnl2\x00', 0x0}) 08:20:27 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @generic={0x2b, "826e67de2f595b5d3bd02d4f77de"}, @llc={0x1a, 0x10f, 0x40, 0x8, 0x1, 0x8}, @tipc=@nameseq={0x1e, 0x1, 0x3, {0x42, 0x0, 0x4}}, 0xffff, 0x0, 0x0, 0x0, 0x401, &(0x7f0000000000)='veth1_to_bridge\x00', 0x3, 0x1, 0x68bc}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f00000000c0)) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x10000, 0x4) clock_gettime(0x0, &(0x7f0000002d40)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002c00)=[{{&(0x7f0000000180)=@xdp, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/211, 0xd3}, {&(0x7f0000000300)=""/85, 0x55}], 0x2, &(0x7f00000003c0)=""/178, 0xb2}, 0x1}, {{&(0x7f0000000480)=@hci, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/105, 0x69}, {&(0x7f0000000580)=""/1, 0x1}], 0x2, &(0x7f0000000600)=""/250, 0xfa}, 0x1}, {{&(0x7f0000000700)=@sco={0x1f, @none}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x2, &(0x7f0000001880)=""/249, 0xf9}, 0x1}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001980)=""/63, 0x3f}], 0x1, &(0x7f0000001a00)=""/124, 0x7c}, 0x7fffffff}, {{&(0x7f0000001a80)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000001b00)=""/4096, 0x1000}], 0x1, &(0x7f0000002b40)=""/156, 0x9c}}], 0x5, 0x2100, &(0x7f0000002d80)={r3, r4+60000000}) r5 = syz_io_uring_complete(0x0) mmap$KVM_VCPU(&(0x7f0000ffd000/0x3000)=nil, 0x930, 0x0, 0x80010, r5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000002dc0)={0x0, @llc={0x1a, 0x311, 0xb1, 0x5, 0x4, 0x5, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2c}}, @generic={0xa, "267c7ff855ce949b5d7caf2f1bf7"}, @tipc=@id={0x1e, 0x3, 0x2, {0x4e22, 0x1}}, 0xfffd, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x2, 0x6}) getsockname(0xffffffffffffffff, &(0x7f0000002e40)=@caif=@dgm, &(0x7f0000002ec0)=0x80) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000002f00)) getpeername(r2, &(0x7f00000030c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, &(0x7f0000003140)=0x80) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000003180), 0x10042, 0x0) ioctl$KVM_SET_MP_STATE(r6, 0x4004ae99, &(0x7f00000031c0)=0x8) bpf$MAP_CREATE(0x0, &(0x7f0000003200)={0x2, 0x1, 0xfffffff8, 0x7, 0x811, r5, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x40) syz_mount_image$vfat(&(0x7f0000003240), &(0x7f0000003280)='./file0\x00', 0x80000001, 0x5, &(0x7f0000004480)=[{&(0x7f00000032c0)="41639cccfc47f1efaa7918de1029e99db5ec652762e5c4bb9c217cb5f19386dfcd40629dd8421cd1916baa72ee4d30541ba4f056d06f2961f0e9843b1c27d8b713459bb53dc47c8e2689357ed17fddcb7325442509f932f51591d933aa95f4ed93b0bdc139892172b25533876342d2b636879ff05fa1ce35c01c9ada8afe5912e7a0d9502e1ddfffc45d", 0x8a, 0x5}, {&(0x7f0000003380)="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", 0x1000, 0x6}, {&(0x7f0000004380)="904befd94e8e95341a630ca4e0b6e83ea32c8db6643906df57f81b8b3869f93e590a2155e1bee55d2d01378f5f5fd7e304db143f49a3a3589db9c36737cdd80860653315d813b2509f0d4ab3961d6e929a7806150e152d59065c21d394e7c21d0946f103f95f82bf1922413b0c20f8d35f", 0x71, 0xe000}, {&(0x7f0000004400)="d359d5cba7fa5e29801c03c93c43361e", 0x10, 0xffffffff}, {&(0x7f0000004440)="d7da5d3d2c8960faf714dfdb4085eea854aa", 0x12}], 0x8, &(0x7f0000004500)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@rodir}, {@utf8no}, {@nonumtail}, {@numtail}, {@numtail}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'cp775'}}, {@shortname_win95}], [{@subj_role={'subj_role', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000059c0)={&(0x7f00000056c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000005980)={&(0x7f0000005940)={0x34, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x8}]}, 0x34}}, 0x10) 08:20:27 executing program 5: mount$binderfs(0x0, &(0x7f0000000740)='./binderfs\x00', 0x0, 0x20, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, '\xff\x1bn<\xff'}}]}) 08:20:27 executing program 3: clock_settime(0x0, &(0x7f0000000540)={0x77359400}) 08:20:27 executing program 4: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x1) 08:20:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@bridge_getneigh={0x1c, 0x1c, 0x20b}, 0x20}}, 0x0) [ 437.146990][T15532] binder: Unknown parameter 'subj_user' 08:20:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2006fff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) close(r0) open(&(0x7f00000002c0)='./bus\x00', 0x14d842, 0x0) sendfile(r0, r0, 0x0, 0x201000) 08:20:27 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setfsuid(r0) [ 437.194824][T15532] binder: Unknown parameter 'subj_user' [ 437.198906][T15528] loop1: detected capacity change from 0 to 7 [ 437.232521][T15537] loop2: detected capacity change from 0 to 7 08:20:27 executing program 5: clone(0x400c000, 0x0, 0x0, 0x0, 0x0) 08:20:27 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3", 0x3b, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:27 executing program 3: connect$netlink(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x95a3e08de9b93ee1, 0x0) 08:20:27 executing program 0: rt_sigaction(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000580)) [ 437.655989][ T26] kauditd_printk_skb: 165 callbacks suppressed [ 437.656006][ T26] audit: type=1800 audit(1639124428.043:189): pid=15548 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=13876 res=0 errno=0 [ 437.689983][T15562] loop1: detected capacity change from 0 to 7 [ 437.729960][ T26] audit: type=1800 audit(1639124428.083:190): pid=15563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13876 res=0 errno=0 08:20:28 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5451, 0x0) 08:20:28 executing program 0: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000001080)="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", 0x171) 08:20:28 executing program 4: syz_mount_image$vfat(&(0x7f0000003240), &(0x7f0000003280)='./file0\x00', 0x0, 0x0, &(0x7f0000004480), 0x0, &(0x7f0000004500)) 08:20:28 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3", 0x3b, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:28 executing program 0: restart_syscall() clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_nanosleep(0x0, 0x1, &(0x7f0000000200)={r0, r1+60000000}, 0x0) [ 438.161021][T15579] FAT-fs (loop4): bogus number of reserved sectors [ 438.190791][T15579] FAT-fs (loop4): Can't find a valid FAT filesystem 08:20:28 executing program 3: fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0) [ 438.205732][T15581] loop1: detected capacity change from 0 to 7 08:20:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180), 0x4) [ 438.305392][T15579] FAT-fs (loop4): bogus number of reserved sectors 08:20:28 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9", 0x3f, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x9200000000000000) r2 = dup3(r1, r0, 0x0) recvmmsg$unix(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, &(0x7f0000001a40)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 438.376275][T15579] FAT-fs (loop4): Can't find a valid FAT filesystem 08:20:28 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000600), 0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0), 0x8}) 08:20:28 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x240) [ 438.618832][T15613] loop1: detected capacity change from 0 to 7 [ 439.061400][T15588] loop2: detected capacity change from 0 to 7 08:20:29 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:29 executing program 5: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) request_key(&(0x7f00000000c0)='.request_key_auth\x00', 0x0, 0x0, 0xfffffffffffffffa) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 08:20:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300020028bd7000fddbdf2507000000", @ANYRES32=0x0, @ANYBLOB="ae8864a8bb15c743d2c5e43303e216c8"], 0x28}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) timerfd_settime(r3, 0x0, 0x0, &(0x7f0000000300)) 08:20:29 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9", 0x3f, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:29 executing program 3: futex(&(0x7f0000000100), 0x4, 0x0, 0x0, 0x0, 0x0) 08:20:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000004880)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}, {0x0}, {0x0}], 0x3}}], 0x1, 0x2, 0x0) [ 439.403540][T15648] loop1: detected capacity change from 0 to 7 08:20:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000003240)={0x2, &(0x7f0000003200)=[{}, {0x8}]}) 08:20:30 executing program 0: syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000400), &(0x7f0000000380)) [ 439.759463][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.759580][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 08:20:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300020028bd7000fddbdf2507000000", @ANYRES32=0x0, @ANYBLOB="ae8864a8bb15c743d2c5e43303e216c8"], 0x28}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) timerfd_settime(r3, 0x0, 0x0, &(0x7f0000000300)) 08:20:30 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9", 0x3f, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:30 executing program 0: mount$binderfs(0x0, &(0x7f00000000c0)='./binderfs\x00', &(0x7f0000000080), 0x0, 0x0) 08:20:30 executing program 5: setreuid(0x0, 0xee00) setresuid(0xee00, 0x0, 0x0) [ 440.463479][T15680] loop1: detected capacity change from 0 to 7 [ 444.574418][T10242] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.855991][T10242] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.985249][T10242] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.178186][T10242] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 447.672222][T10242] device hsr_slave_0 left promiscuous mode [ 447.699403][T10242] device hsr_slave_1 left promiscuous mode [ 447.768181][T10242] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 447.775639][T10242] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 447.830289][T10242] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 447.878003][T10242] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 447.939249][T10242] device bridge_slave_1 left promiscuous mode [ 447.967975][T10242] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.077968][T10242] device bridge_slave_0 left promiscuous mode [ 448.084214][T10242] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.218035][T10242] device veth1_macvtap left promiscuous mode [ 448.224113][T10242] device veth0_macvtap left promiscuous mode [ 448.303883][T10242] device veth1_vlan left promiscuous mode [ 448.335361][T10242] device veth0_vlan left promiscuous mode [ 449.970497][T10242] team0 (unregistering): Port device team_slave_1 removed [ 450.057222][T10242] team0 (unregistering): Port device team_slave_0 removed [ 450.133521][T10242] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 450.353117][T10242] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 451.028789][ T46] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 451.044008][ T46] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 451.054607][ T46] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 451.063516][ T46] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 451.087822][ T46] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 451.095150][ T46] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 451.229589][T10242] bond0 (unregistering): Released all slaves [ 451.882145][T15772] chnl_net:caif_netlink_parms(): no params data found [ 452.317058][T15772] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.354530][T15772] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.428531][T15772] device bridge_slave_0 entered promiscuous mode [ 452.449955][T15772] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.495581][T15772] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.528970][T15772] device bridge_slave_1 entered promiscuous mode [ 452.695301][T15772] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 452.756694][T15772] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 452.932223][T15772] team0: Port device team_slave_0 added [ 452.991891][T15772] team0: Port device team_slave_1 added [ 453.149758][T15772] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 453.169019][ T7948] Bluetooth: hci1: command 0x0409 tx timeout [ 453.175788][T15772] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 453.284147][T15772] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 453.330713][T15772] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 453.354861][T15772] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 453.458067][T15772] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 453.720030][T15772] device hsr_slave_0 entered promiscuous mode [ 453.756377][T15772] device hsr_slave_1 entered promiscuous mode [ 453.779073][T15772] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 453.786665][T15772] Cannot create hsr debugfs directory [ 454.411771][T15772] 8021q: adding VLAN 0 to HW filter on device bond0 [ 454.490106][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 454.510585][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 454.533335][T15772] 8021q: adding VLAN 0 to HW filter on device team0 [ 454.577289][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 454.606925][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 454.618076][ T6604] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.625167][ T6604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.688606][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 454.713721][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 454.758323][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 454.766764][ T6604] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.773908][ T6604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.848158][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 454.920365][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 454.942651][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 454.974141][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 454.998510][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 455.035076][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 455.069303][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 455.095412][ T6604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 455.129171][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 455.143246][T15772] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 455.196008][T15772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 455.237844][ T927] Bluetooth: hci1: command 0x041b tx timeout [ 455.245251][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 455.268180][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 455.304454][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 455.314811][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 455.351641][T15772] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 455.770754][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 455.788164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 455.869871][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 455.887107][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 455.916683][T15772] device veth0_vlan entered promiscuous mode [ 455.938900][ T6606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 455.946747][ T6606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 455.983011][T15772] device veth1_vlan entered promiscuous mode [ 456.078442][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 456.088741][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 456.096895][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 456.143933][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 456.205377][T15772] device veth0_macvtap entered promiscuous mode [ 456.258141][T15772] device veth1_macvtap entered promiscuous mode [ 456.329682][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 456.385916][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.417563][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 456.452513][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.477815][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 456.517562][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.527402][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 456.570993][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.617638][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 456.645175][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.679797][T15772] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 456.691361][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 456.724680][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 456.749755][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 456.783713][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 456.798252][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 456.838272][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.873751][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 456.908503][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.951924][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 456.982314][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 457.020470][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 457.061169][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 457.115514][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 457.128913][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 457.164083][T15772] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 457.181046][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 457.202910][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 457.307867][ T7948] Bluetooth: hci1: command 0x040f tx timeout [ 457.415331][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 457.447713][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 457.491207][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 457.577722][T15692] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 457.585931][T15692] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 457.628356][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 459.397610][ T7948] Bluetooth: hci1: command 0x0419 tx timeout 08:20:50 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x891e, &(0x7f00000002c0)={'syztnl2\x00', 0x0}) 08:20:50 executing program 0: setreuid(0x0, 0xee00) fsmount(0xffffffffffffffff, 0x0, 0x0) 08:20:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000c40), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x14, r1, 0x1}, 0x14}}, 0x0) 08:20:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300020028bd7000fddbdf2507000000", @ANYRES32=0x0, @ANYBLOB="ae8864a8bb15c743d2c5e43303e216c8"], 0x28}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) timerfd_settime(r3, 0x0, 0x0, &(0x7f0000000300)) 08:20:50 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b", 0x41, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:50 executing program 0: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000002080), 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002140), 0xffffffffffffffff) [ 460.131851][T16167] loop1: detected capacity change from 0 to 7 [ 460.718656][T16182] loop2: detected capacity change from 0 to 7 08:20:51 executing program 5: keyctl$KEYCTL_MOVE(0x14, 0x0, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x0) 08:20:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300020028bd7000fddbdf2507000000", @ANYRES32=0x0, @ANYBLOB="ae8864a8bb15c743d2c5e43303e216c8"], 0x28}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) timerfd_settime(r3, 0x0, 0x0, &(0x7f0000000300)) 08:20:51 executing program 3: socketpair(0x1d, 0x0, 0x6, &(0x7f0000000600)) 08:20:52 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b", 0x41, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:52 executing program 4: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, r0, 0xdb1ec540e4e387b, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 08:20:52 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x40) 08:20:52 executing program 3: bpf$PROG_LOAD(0x13, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:20:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)=0x18) [ 462.068674][T16206] loop1: detected capacity change from 0 to 7 08:20:52 executing program 4: socket$caif_seqpacket(0x25, 0x5, 0x3) 08:20:52 executing program 0: socket$inet(0x2, 0xa, 0x6) 08:20:52 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b", 0x41, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:52 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x1406, 0x811}, 0x10}}, 0x0) 08:20:52 executing program 5: unshare(0x48000200) bpf$OBJ_GET_PROG(0x10, &(0x7f0000000000)={0x0, 0x2, 0x10}, 0x10) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000006280), r0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x28}}, 0x0) 08:20:52 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8903, &(0x7f0000000080)={'wlan1\x00'}) 08:20:52 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000300)={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) [ 462.354511][T16225] loop2: detected capacity change from 0 to 7 08:20:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) 08:20:52 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:52 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8911, &(0x7f0000000080)={'wlan1\x00'}) [ 462.558242][T16243] loop1: detected capacity change from 0 to 7 08:20:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f0000000ac0)={&(0x7f0000000780)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "77ec51abe96b2dae0ad95b5d21ed00015356bc50ba3f3d3b8ec1caa3ce16647183432cfa45881b3d632a679a0ee61e8061aa832dd9c0bd4c2d2c8951ed700b"}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000800)=')', 0x1}], 0x1}, 0x0) 08:20:53 executing program 3: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0x5452, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000006080)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CH_SWITCH_COUNT={0x8}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}], @NL80211_ATTR_CSA_IES={0xe88, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x12, 0xbb, [0x0, 0x0, 0xa9a8, 0x0, 0x0, 0x0, 0x0]}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x595, 0x91, "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"}, @NL80211_ATTR_IE={0x209, 0x2a, [@chsw_timing={0x68, 0x4}, @prep={0x83, 0x1f, @not_ext={{}, 0x0, 0x3f, @broadcast}}, @measure_req={0x26, 0xe2, {0x0, 0x2, 0x0, "53f27dfd5885d6760e6643ef22f022dc7043671b393c792e81b68484752fe5fb1f4d8c188408103165328d6e9bead8a40b27f9bbe91627b5149527e15d7e8ea0789afa79df69dbe75254a314eb57d63e5f0bf3c7d5f3bed5454a5eec21e09dae180db909c20fd1dda0485bb314cd85ecb4e81a67134560cbc5866e029b6744238ed79054397f068d07063bd1483ae9568b7f552f90ee6b424f383531a982c97588691c5112423dfa7696a275d9d3587c3db90e1d2baa12a617315909755a1c523ea365c4246becdb21cc6fb75fbb89e6036d1a596a6b8441ef4bbef8b7cd9b"}}, @chsw_timing={0x68, 0x4}, @mesh_chsw={0x76, 0x6}, @tim={0x5, 0xe6, {0x0, 0x59, 0x0, "f45ec46b128bed0db486b97830e04af0b6c584f9d76e0b1644cfaa2e5cfa6fe0e088d952ab37264f8db2b53c313dc4f72c0a507893e67a716cb0c8f701f19d618e0c57a4a8863bbf32839e4f15ccee2b64caa327fe78bb004d9fa128e73004a4c69aeb389e6f30739d5a271ac23960ad69d89ad63c6c2def8cd0e332c99c0e66ecd76c1d9ae3980b6c36cf64676bdf267670bc5123fca9ce6f3280ab72804e1e5a97b738e49c94f2493d1e06424e9c7f187ae92b44f050fe06fd9a42f8c0157ba5b83c05d70c009284de318dd52b8e671f2e3b5942386d3bf49b3d170743558a074548"}}, @ibss={0x6, 0x2, 0x9}]}, @NL80211_ATTR_PROBE_RESP={0x6b9, 0x91, "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"}, @NL80211_ATTR_PROBE_RESP={0x9, 0x91, "a934340a30"}, @NL80211_ATTR_PROBE_RESP={0x4}]]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 08:20:53 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d", 0x42, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:53 executing program 0: socketpair(0x25, 0x0, 0x0, &(0x7f0000001680)) [ 462.815577][T16274] loop2: detected capacity change from 0 to 7 08:20:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000013c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8ed4a7040b97212d}, 0xc, &(0x7f0000001380)={&(0x7f0000000040)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xeb0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x51, 0x4, "c1d06833d5fa92b33445b9133e2d09674e2cced10b1861cbb0e8a4b2441dc34754b95782caf196974a5a4aa24f72bd03f080eacb9236ba9a09bc8cadbd31ca8d85f7fca31836f01c3e1702b2e7"}, @ETHTOOL_A_BITSET_BITS={0xb0, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'\\!\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, ')&^}}[&]&\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '+,\xd0!-]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x4d, 0x5, "e65211cb0fa7aca131b9d9e7ccd867e6c665940e571ea225e5ecc5946d6462e94bf7a7dfa6f7898990f3a2a45bd7a579369294632a08d02df98bbb7786f7c2ca563b124ee4abb524c4"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0xdd, 0x5, "7cdf9b348ff4a6f2680a9efda39a9fea890d4982ea66acda51331a75fe2978bdfd175507f40f564b89cc304f3bd6b1a162b64b9287b4dbda55d068a489c092e7447d489019f3b4a93661c0318c39af4eb66dbdbef8c61daab0b00e2e15f20f24bc05737fd0b554372db117bbd7df9e8de77eefc1be794c1ed7212afa431a6095dd8db254bb06823fe290612b81925d164bc83999ae25073512c67e641ffc4b75359f789971c169063318d07714d406b46c9a011e20fa04939d75a64b71f6f00426601e4d069c8f156b27fab1e10b5ae5383ca531ef1b860451"}, @ETHTOOL_A_BITSET_VALUE={0xc5d, 0x4, "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"}]}]}, 0xec4}}, 0x0) 08:20:53 executing program 3: r0 = socket(0x2a, 0x2, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x80) [ 463.042252][T16295] loop1: detected capacity change from 0 to 7 08:20:53 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:20:53 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:53 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/time_for_children\x00') 08:20:53 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x541b, &(0x7f0000000080)={'wlan1\x00'}) 08:20:53 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x1}, &(0x7f0000000040)={0x6}, 0x0, 0x0, 0x0) 08:20:53 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d", 0x42, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x7, &(0x7f0000000a00)={@multicast1, @multicast2}, &(0x7f0000000a40)=0xc) 08:20:53 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 08:20:53 executing program 4: r0 = socket(0x2a, 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={0x0, 0xf0ff7f}}, 0x0) [ 463.444602][T16337] loop2: detected capacity change from 0 to 7 08:20:53 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x1412, 0x3}, 0x10}}, 0x0) 08:20:54 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff}) connect$phonet_pipe(r0, 0x0, 0x55) [ 463.583298][T16341] loop1: detected capacity change from 0 to 7 08:20:54 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:54 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8910, &(0x7f0000000080)={'wlan1\x00'}) 08:20:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000001180)=ANY=[], 0x1010) 08:20:54 executing program 5: unshare(0x48000200) pipe(0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x0) 08:20:54 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast2}}) 08:20:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x2c, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x0, @dev, 0x101}]}, &(0x7f00000002c0)=0x10) 08:20:54 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d", 0x42, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:54 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) [ 463.950975][T16368] loop2: detected capacity change from 0 to 7 08:20:54 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x24044840) 08:20:54 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:54 executing program 0: socketpair(0xb, 0x0, 0x0, &(0x7f0000000140)) 08:20:54 executing program 3: unshare(0x48000200) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, 0x0, 0x0) [ 464.178702][T16392] loop1: detected capacity change from 0 to 7 08:20:54 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5421, &(0x7f0000000080)={'wlan1\x00'}) [ 464.381454][T16413] loop2: detected capacity change from 0 to 7 08:20:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @remote}]}, &(0x7f0000000140)=0x10) 08:20:54 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 464.769555][T16464] loop1: detected capacity change from 0 to 7 08:20:58 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040), 0x8) 08:20:58 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000940)={'ip6_vti0\x00', 0x0}) 08:20:58 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) syz_mount_image$f2fs(&(0x7f0000000740), 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:58 executing program 0: bpf$PROG_LOAD(0x3, 0x0, 0x0) 08:20:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000006080)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x5e}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7}], @NL80211_ATTR_CSA_IES={0xe88, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x12, 0xbb, [0xffff, 0x1, 0xa9a8, 0xff, 0xa, 0x4, 0x9]}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x596, 0x91, "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"}, @NL80211_ATTR_IE={0x209, 0x2a, [@chsw_timing={0x68, 0x4, {0x0, 0xa2}}, @prep={0x83, 0x1f, @not_ext={{}, 0x0, 0x0, @broadcast}}, @measure_req={0x26, 0xe2, {0x0, 0x0, 0x0, "53f27dfd5885d6760e6643ef22f022dc7043671b393c792e81b68484752fe5fb1f4d8c188408103165328d6e9bead8a40b27f9bbe91627b5149527e15d7e8ea0789afa79df69dbe75254a314eb57d63e5f0bf3c7d5f3bed5454a5eec21e09dae180db909c20fd1dda0485bb314cd85ecb4e81a67134560cbc5866e029b6744238ed79054397f068d07063bd1483ae9568b7f552f90ee6b424f383531a982c97588691c5112423dfa7696a275d9d3587c3db90e1d2baa12a617315909755a1c523ea365c4246becdb21cc6fb75fbb89e6036d1a596a6b8441ef4bbef8b7cd9b"}}, @chsw_timing={0x68, 0x4}, @mesh_chsw={0x76, 0x6}, @tim={0x5, 0xe6, {0x0, 0x0, 0x0, "f45ec46b128bed0db486b97830e04af0b6c584f9d76e0b1644cfaa2e5cfa6fe0e088d952ab37264f8db2b53c313dc4f72c0a507893e67a716cb0c8f701f19d618e0c57a4a8863bbf32839e4f15ccee2b64caa327fe78bb004d9fa128e73004a4c69aeb389e6f30739d5a271ac23960ad69d89ad63c6c2def8cd0e332c99c0e66ecd76c1d9ae3980b6c36cf64676bdf267670bc5123fca9ce6f3280ab72804e1e5a97b738e49c94f2493d1e06424e9c7f187ae92b44f050fe06fd9a42f8c0157ba5b83c05d70c009284de318dd52b8e671f2e3b5942386d3bf49b3d170743558a074548"}}, @ibss={0x6, 0x2}]}, @NL80211_ATTR_PROBE_RESP={0x6b9, 0x91, "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"}, @NL80211_ATTR_PROBE_RESP={0xd, 0x91, "a934340a3088c58dc5"}]]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 08:20:58 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000040)) 08:20:59 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0x0}}, 0x20) 08:20:59 executing program 0: bpf$PROG_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:20:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000640)={'ip_vti0\x00', &(0x7f0000000580)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @multicast1, @broadcast}}}}) [ 468.671152][T16550] loop1: detected capacity change from 0 to 7 [ 468.691839][T16552] loop2: detected capacity change from 0 to 7 08:20:59 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0xf97, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:20:59 executing program 4: r0 = socket(0x2a, 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 08:20:59 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:20:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x2, 0x3, 0x330, 0x1c8, 0x0, 0x1c8, 0x1c8, 0x1c8, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@uncond, 0x0, 0x1a8, 0x1c8, 0x0, {0x4a03}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x4, 0x0, 'syz1\x00'}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x390) 08:20:59 executing program 3: socket(0x11, 0x80a, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000043c0), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000780)={0xb7}, 0x0, &(0x7f0000000800)={0x189}, 0x0, 0x0) 08:20:59 executing program 0: socket$inet(0x2, 0x3, 0x74) 08:20:59 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) sendmsg$nl_route(r0, 0x0, 0x0) [ 469.109967][T16581] Cannot find add_set index 0 as target 08:20:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x30, &(0x7f0000000080)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e21, @rand_addr=0x64010102}, @in={0x2, 0x0, @dev}]}, &(0x7f0000000140)=0x10) 08:20:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010100, 0x0) 08:20:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0x10) [ 469.214103][T16584] loop2: detected capacity change from 0 to 7 [ 469.265819][T16587] loop1: detected capacity change from 0 to 7 08:20:59 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 08:20:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0), r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}]}, 0x28}}, 0x0) [ 469.665520][T16629] block nbd5: not configured, cannot reconfigure 08:21:00 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x7, &(0x7f0000003500)=[{&(0x7f0000000840), 0x0, 0x4}, {&(0x7f0000000dc0), 0x0, 0x40}, {&(0x7f0000000e80)="ff98d859c9652f14ce2950fb65d495abff1b8ad12cfa80868c951b4487674355777faf21f3999d1130781988384da38cc6e4de319a9401329e881a9622aca8e3cb7e424cd07784ebbcdc4bf9524bbac65cc346e9f154f9", 0x57}, {&(0x7f0000000f00), 0x0, 0x2}, {0x0}, {0x0, 0x0, 0x1c}, {&(0x7f0000003440), 0x0, 0x3}], 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:00 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:00 executing program 0: socketpair(0x2, 0x1, 0x4, &(0x7f0000003680)) 08:21:00 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @mcast1}, 0x20) 08:21:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x40) 08:21:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0), r0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x1}, 0x14}}, 0x0) 08:21:00 executing program 4: r0 = socket(0x2a, 0x2, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x50}}, 0x0) [ 469.941490][T16643] loop1: detected capacity change from 0 to 7 08:21:00 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:00 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x8916, 0x0) 08:21:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[], 0x1b4}}, 0x0) 08:21:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000004500)={'syztnl0\x00', &(0x7f0000004400)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty, {[@ra={0x94, 0x4}, @lsrr={0x83, 0x23, 0x0, [@local, @loopback, @dev, @multicast2, @local, @broadcast, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x13, 0x0, [@local, @dev, @rand_addr, @private]}, @timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty}, {@multicast1}, {@broadcast}, {@multicast1}, {@multicast1}, {@remote}, {@empty}]}]}}}}}) [ 470.202962][T16656] nbd: must specify an index to disconnect 08:21:00 executing program 5: sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r1, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, r0, 0xdb1ec540e4e387b, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x3}]}, 0x1c}}, 0x0) [ 470.413180][T16667] loop1: detected capacity change from 0 to 7 [ 470.530792][T16674] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 08:21:01 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:01 executing program 0: r0 = socket$inet(0x2, 0x3, 0x74) sendmmsg$inet(r0, &(0x7f0000007cc0)=[{{&(0x7f0000004f00)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000005180)=[@ip_retopts={{0x10}}], 0x10}}], 0x1, 0x0) 08:21:01 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0045878, 0x0) 08:21:01 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8990, &(0x7f0000000080)={'wlan1\x00'}) 08:21:01 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:01 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x8936, 0x0) 08:21:01 executing program 4: bpf$PROG_LOAD(0xa, 0x0, 0x3f) 08:21:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)=ANY=[]}) 08:21:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x21, 0x0, &(0x7f00000000c0)) [ 470.860744][T16689] loop1: detected capacity change from 0 to 7 08:21:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 08:21:01 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000000)) 08:21:01 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 471.330388][T16715] loop1: detected capacity change from 0 to 7 [ 471.446683][T13043] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 08:21:02 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x828012, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:02 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 08:21:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffedb, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030030000d05d25a80648c6394f90324fc60100009400a080000053582c137156c370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 08:21:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000001280)) 08:21:02 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0xc0}, 0x10}}, 0x0) 08:21:02 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:02 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000300)={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, {0x0, 0x6558, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) [ 471.810343][T16734] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 471.832498][T16731] loop1: detected capacity change from 0 to 7 08:21:02 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @remote}}) 08:21:02 executing program 3: socketpair(0x1e, 0x0, 0x2, &(0x7f0000000640)) [ 471.852177][T16734] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.5'. 08:21:02 executing program 5: pipe(&(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)) 08:21:02 executing program 0: r0 = socket(0x2a, 0x2, 0x0) bind$llc(r0, 0x0, 0x0) 08:21:02 executing program 3: pipe(&(0x7f0000000740)={0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) [ 472.506718][ T7914] Bluetooth: hci2: command 0x0406 tx timeout 08:21:03 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000035c0)={[{@acl}], [{@subj_role={'subj_role', 0x3d, 'squashfs\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '\'\xa6-/&&!*\x1b\\[^@J]'}}]}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:03 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000100)={'sit0\x00', 0x0}) 08:21:03 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:03 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @private1}}) 08:21:03 executing program 5: bpf$PROG_LOAD(0x3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:21:03 executing program 3: r0 = socket$phonet(0x23, 0x2, 0x1) sendto$phonet(r0, 0x0, 0x0, 0x48c1, 0x0, 0x0) sendto$phonet(r0, &(0x7f0000000140)="8e", 0x1, 0x40, &(0x7f0000000200)={0x23, 0x1}, 0x10) 08:21:03 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x80086601, 0x0) 08:21:03 executing program 4: pipe(&(0x7f0000000740)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5452, &(0x7f0000000080)={'wlan1\x00'}) 08:21:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, 0x0, 0x0) 08:21:03 executing program 3: unshare(0x48000200) bpf$OBJ_GET_PROG(0x10, &(0x7f0000000000)={0x0, 0x2, 0x10}, 0x10) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000006280), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000727bd7000fddbdf2501000000080001007a0000000c009900bde85d1cbe1f3ea7000001002c000000"], 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000080) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x52000005}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xcc, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9914}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x800}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xd}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x7ee6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x1a}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x84}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1ff}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40}, 0x884) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000240)=0x9) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getrule={0x14, 0x22, 0x8, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48805}, 0x4010) unshare(0x8010000) [ 473.171424][T16771] loop1: detected capacity change from 0 to 7 08:21:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 08:21:03 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 473.630843][T16812] loop1: detected capacity change from 0 to 7 08:21:04 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f00000002c0)=0x10) 08:21:04 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x2, &(0x7f0000000080)={'wlan1\x00'}) 08:21:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000640)={'ip_vti0\x00', &(0x7f0000000580)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @multicast1, @broadcast, {[@timestamp={0x44, 0x4}]}}}}}) 08:21:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000006080)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CH_SWITCH_COUNT={0x8}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}], @NL80211_ATTR_CSA_IES={0xe88, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x12, 0xbb, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x595, 0x91, "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"}, @NL80211_ATTR_IE={0x209, 0x2a, [@chsw_timing={0x68, 0x4}, @prep={0x83, 0x1f, @not_ext={{}, 0x0, 0x0, @broadcast}}, @measure_req={0x26, 0xe2, {0x0, 0x0, 0x0, "53f27dfd5885d6760e6643ef22f022dc7043671b393c792e81b68484752fe5fb1f4d8c188408103165328d6e9bead8a40b27f9bbe91627b5149527e15d7e8ea0789afa79df69dbe75254a314eb57d63e5f0bf3c7d5f3bed5454a5eec21e09dae180db909c20fd1dda0485bb314cd85ecb4e81a67134560cbc5866e029b6744238ed79054397f068d07063bd1483ae9568b7f552f90ee6b424f383531a982c97588691c5112423dfa7696a275d9d3587c3db90e1d2baa12a617315909755a1c523ea365c4246becdb21cc6fb75fbb89e6036d1a596a6b8441ef4bbef8b7cd9b"}}, @chsw_timing={0x68, 0x4}, @mesh_chsw={0x76, 0x6}, @tim={0x5, 0xe6, {0x0, 0x0, 0x0, "f45ec46b128bed0db486b97830e04af0b6c584f9d76e0b1644cfaa2e5cfa6fe0e088d952ab37264f8db2b53c313dc4f72c0a507893e67a716cb0c8f701f19d618e0c57a4a8863bbf32839e4f15ccee2b64caa327fe78bb004d9fa128e73004a4c69aeb389e6f30739d5a271ac23960ad69d89ad63c6c2def8cd0e332c99c0e66ecd76c1d9ae3980b6c36cf64676bdf267670bc5123fca9ce6f3280ab72804e1e5a97b738e49c94f2493d1e06424e9c7f187ae92b44f050fe06fd9a42f8c0157ba5b83c05d70c009284de318dd52b8e671f2e3b5942386d3bf49b3d170743558a074548"}}, @ibss={0x6, 0x2}]}, @NL80211_ATTR_PROBE_RESP={0x6b9, 0x91, "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"}, @NL80211_ATTR_PROBE_RESP={0xd, 0x91, "a934340a3088c58dc5"}]]}]}, 0xec4}}, 0x0) 08:21:04 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:04 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x1a, 0x0, 0x4, 0x1, 0x40, 0x4, @remote}, 0x10) 08:21:04 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x4020940d, &(0x7f0000000080)={'wlan1\x00'}) 08:21:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) [ 474.125772][T16852] loop1: detected capacity change from 0 to 7 08:21:04 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x1ff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x1fc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0xc9a0f5a, 0x4b}}}}, [@NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x3d}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_IE={0x1b9, 0x2a, [@perr={0x84, 0x6f, {0x1, 0x7, [@ext={{}, @device_a, 0x2, @device_b, 0x2e}, @ext={{}, @device_a, 0x1, @device_b, 0x3b}, @not_ext={{}, @device_b, 0x4578, "", 0x21}, @not_ext={{}, @broadcast, 0x6f3}, @not_ext={{}, @broadcast, 0x100, "", 0x1d}, @ext={{}, @device_a, 0x8, @device_a, 0x13}, @not_ext={{}, @device_b, 0x20, "", 0x22}]}}, @mesh_config={0x71, 0x7, {0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, @chsw_timing={0x68, 0x4, {0x2, 0x5}}, @chsw_timing={0x68, 0x4, {0x0, 0xd4}}, @supported_rates={0x1, 0x3, [{0x6c}, {0xc}, {0x5, 0x1}]}, @random={0x9, 0x92, "dee309c7c397d1733ee700370c4010406625d4bf32c2bef497ec5526f575a6ea865042cf2f1fbef7e3b18a727da4132c5163b31fb8c85cfa53aba2c4e5aa9e64b551fbdad2704abd2c82f68c969378557f492f7e5385b0a5b43dd3d7abac4461d744956a49ee397ee9c1450e4bfd7ae5b1e6343dd727858eca9d24c1373f5c921b9c3cd3425a97670b4f26408c3ff6ba9f45"}, @random={0xfa, 0x80, "7ea2974580d323877b65aae75f177a02a8254a83445ae581213c0cefafdb56ba13f93adb9b244d3086489c0b562cbaaa9d58835af0d56d9309e7e5b7c4bb3b80bb62c6f87392385716db90ed9e3beac1b01ab237695a79d1cb30d97292cfeda1ce40b5286e136f1813e1819727164b76bb18281f51b7f956be20a3d3a885517b"}, @link_id={0x65, 0x12}]}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x10}, 0x800) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f00000000c0)) 08:21:04 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x895c, &(0x7f0000000080)={'wlan1\x00'}) 08:21:04 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 08:21:05 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:05 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x5452, 0x0) 08:21:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x3f}, 0x8) 08:21:05 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{0x0}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x100, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}}) 08:21:05 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8918, &(0x7f0000000080)={'wlan1\x00'}) 08:21:05 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) 08:21:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x40) 08:21:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f00000012c0)=@ipv4_newroute={0x1c}, 0x1c}}, 0x0) 08:21:05 executing program 5: unshare(0x48000200) bpf$OBJ_GET_PROG(0x10, &(0x7f0000000000)={0x0, 0x2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 474.971601][T16889] loop1: detected capacity change from 0 to 7 08:21:05 executing program 3: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000080)) 08:21:05 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {0x0, 0x0, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:05 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:05 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000000c0)=ANY=[], 0xd0) 08:21:05 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$inet(r0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[], 0x1b8}, 0x0) 08:21:05 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x8918, 0x0) 08:21:05 executing program 3: unshare(0x48000200) bpf$OBJ_GET_PROG(0x10, &(0x7f0000000000)={0x0, 0x2, 0x10}, 0x10) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(0x0, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000727bd7000fddbdf2501000000080001007a0000000c009900bde85d1cbe1f3ea7000001002c000000"], 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000080) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x52000005}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xcc, 0x0, 0x2, 0x70bd28, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9914}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x800}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xd}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x7ee6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x1a}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x84}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1ff}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40}, 0x884) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000240)=0x9) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getrule={0x14, 0x22, 0x8, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48805}, 0x0) unshare(0x0) [ 475.411091][T16915] loop1: detected capacity change from 0 to 7 08:21:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@sndrcv={0x2c}, @sndrcv={0x2c}, @init={0x14}, @authinfo={0x10}, @sndrcv={0x2c}, @prinfo={0x14}], 0xbc}, 0x0) 08:21:05 executing program 0: socketpair(0x1a, 0x0, 0x0, &(0x7f0000001500)) 08:21:05 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {0x0, 0x0, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f00000000c0)) [ 475.881203][T16987] loop1: detected capacity change from 0 to 7 08:21:10 executing program 5: unshare(0x48000200) bpf$OBJ_GET_PROG(0x10, &(0x7f0000000000)={0x0, 0x2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 08:21:10 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0xe5d1de294818759, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 08:21:11 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {0x0, 0x0, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f00000000c0)) 08:21:11 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:11 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) [ 480.706681][T17054] loop1: detected capacity change from 0 to 7 08:21:11 executing program 4: r0 = socket(0x2a, 0x2, 0x0) accept4$llc(r0, 0x0, 0x0, 0x0) 08:21:11 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x8904, 0x0) 08:21:11 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0), 0x0, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:11 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000100)={@void, @val, @mpls={[], @llc={@snap={0x0, 0x0, "b3", "c399c1"}}}}, 0x12) write$tun(r0, &(0x7f0000000140)={@void, @val, @eth={@broadcast, @local, @val, {@llc={0x4, {@llc={0x0, 0x0, "1a"}}}}}}, 0x23) 08:21:11 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040), &(0x7f0000000080)=0x10) 08:21:11 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff}, 0xc) 08:21:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) 08:21:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040)="de", 0x1) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 08:21:11 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89a1, &(0x7f0000000080)={'wlan1\x00'}) 08:21:11 executing program 3: r0 = socket(0x2a, 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x2a}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) [ 481.344762][T17099] loop1: detected capacity change from 0 to 7 08:21:12 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:12 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0), 0x0, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000100)=0x1000, 0x4) 08:21:12 executing program 5: bpf$PROG_LOAD(0x11, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:21:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000040)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xeac, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x51, 0x4, "c1d06833d5fa92b33445b9133e2d09674e2cced10b1861cbb0e8a4b2441dc34754b95782caf196974a5a4aa24f72bd03f080eacb9236ba9a09bc8cadbd31ca8d85f7fca31836f01c3e1702b2e7"}, @ETHTOOL_A_BITSET_BITS={0xb0, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'\\!\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, ')&^}}[&]&\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '+,\xd0!-]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x4d, 0x5, "e65211cb0fa7aca131b9d9e7ccd867e6c665940e571ea225e5ecc5946d6462e94bf7a7dfa6f7898990f3a2a45bd7a579369294632a08d02df98bbb7786f7c2ca563b124ee4abb524c4"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_MASK={0xe0, 0x5, "7cdf9b348ff4a6f2680a9efda39a9fea890d4982ea66acda51331a75fe2978bdfd175507f40f564b89cc304f3bd6b1a162b64b9287b4dbda55d068a489c092e7447d489019f3b4a93661c0318c39af4eb66dbdbef8c61daab0b00e2e15f20f24bc05737fd0b554372db117bbd7df9e8de77eefc1be794c1ed7212afa431a6095dd8db254bb06823fe290612b81925d164bc83999ae25073512c67e641ffc4b75359f789971c169063318d07714d406b46c9a011e20fa04939d75a64b71f6f00426601e4d069c8f156b27fab1e10b5ae5383ca531ef1b860451671b89"}, @ETHTOOL_A_BITSET_VALUE={0xc5a, 0x4, "8fb44e77136cdddb69a3b1c7dc52ba52ad830790a230f8ae68dd3020d3af37c65c88a8db3ea18f94d560b16baed57eabcb90fd30f4e74aa4f55be9a72b4b7e244c0b84296a5ad11dad6d2edfe165cb78b1fccc4c35e40af398899eb711bf05d53d26078af4efa50d6f2aabfa5e5eef9377060483148b94178e3f540e2e5667a163718fc622e02f24709403bb6ad32b40ae8da97a6c086eb1887ff71da8c4506c9baba8de88ebb929c0915624a4ae67535e26dd41e684a8181925bc89994b384170f56e7efd929a3231f734d4350719958c9c13fa801a59b2316aa804dea655998166a30e81fbb71a66b600ee8402dd7ba7d53dd53fec217da92c04edda8039a90dca6d903a4942ce4236f471ede0293fd8db9ba188de7c84870ad46ba1c31f93ba93496d25b08817508dc31de6681d9c2846d3a0831e47861d5ef0a50d5230555044c68fc55812537422547562a3d275e71761c03cb83e7dd2d1314aaa17d4377d8fb6ad2d58bf188ea47bbac20b6544126564a174d11674fef6e3f4d7da3d8bc707faab757c96331432daf3f8b863b0234ed73ba074144a9a6ebe7c7868eb8047a39d00c6f5d59e01c455a8be0a7a9bff226083b9ddbc22ce4a51e90ce82cb0e4781992ea1de66849a65f6cd750b8f50069bb8b28ae43a86046e943f9f10d8c145d526832aecc706e094a4791c624455a3fdfef2d591de215aad06183628f90d063dbc015227c82a82abf620426497242bcf074c54c0fc132613340e7237fa1d84a9d04a7bcf74dfc9cdeda1f0d5e21b1da8e4e00c3262e62c284b3220dc83be92fe262b6ef464238ff6a4b8a468ed68740604d9316bf2ddc2f1ae037d8b6622a358e742d1993a72084990e9d646981ba852059de250727f6bec54e6afad1c2cdba41a2430365ebd4af6291ca5585081bc437ef93c0218b8efed9063f77ddb0bba77742967292c1b7c84e9fe244e09c7c14f0d2e5d1e96d279f7b6767c4dfb8c107ac55735feb2b4c7945b048fb7ba4b6e8fb2d1d7f3475a89eb48dc23ff11c678f2fde6c58d3b33d640254172432bb19bed8be70a05f55f06626f30ce133bff1021e67dbe683dd736cce7510eab6eeb6aea4c244bd3a96a765b358ad3c67b967b03aee07607e41b86736684700b80c3dec451d1f016f29b8a5a0bd8175a6df8755e90f49b8de8ce562b009b5008970102704224fd76cef6e3cec44ccc3f09ca1f4d19b96d6e50264d0a107c060178f3dc5d71753a99e1bb2f5ef3bd1bdf8231504f2460a663c57b5b9dcacb78796fa09a05bc4c18a8a834ac5546fe3fbabd64de253fd48a51396ade3743caa11edc4c71c67b4fad4ef6592e913f8b6b77b5e2c33c21d2aa4e97712a2593e72cd08f21e25a920268ad4e922306e1c8a868642abb19470aab3b249a88391ad4525ef146a3fcbd05380a26d22fbe17bbc02a57a5fb6be9fb4453f6019460ee5fd867d32e25186d84597095228c556db5d3c9b9a66d0408fdf2b26843c07d18ba866326822233c639c4a08df87a2aa2f5a548ccd6a905477cbeb71de3202ec3283a5ba011f67441669669af436b6c3336b459059d4ece71944cb59151a2d9ef06b15363258916997e8a69718649711892b4002f0d9dbc97ed44af79bb791cf0e4930dfaafea352f30931959f1a396cfeb980c28029eb0311b407cdc282b410dfb672d23217ae2fe71408d3efc6c8c4ab14607317fa569095ce8e7c10e92cf7b15d203836e34c8ca04331cbdf36d8f1c3394490d5ad5fc8ec248b75a89984c13972108ea107e3a12730cc3e40488289d12422d6aabce2816242e5415a36709bc3bf9c9f218e5089a3709db3670095ad76a9dd3f3f3a8ea6fa3731c256cc6d759ed6d9e0518361fe5d0e13a0ce22f19494cb998399f85202a8bc6ffd46448af6c1548d10a68c434ec4182b40624458f5f814b665ab043dcf1ffdec440e61052bd31e2234470779af2cd77e62017bce864c2cd2cf9ee3937f71f767e8507f9bff588ae34c40dc1ef8e97f4373af40584e5084f01067ffe7b39cace8bd7a01ca4222fe43f0d3a72e0d52e820f63cfe6ff9dca2a70e7327e849c6bef90a37c067cf840c2cefb1ddd16ee43f6da92f05d868c96f55444e3ad6929707808981981284a94bcf3e997608248a77ae0fbf6deef4a5351de7dc845be0e9cd4362ec24bcbe34e311e79ec723967c37324bd4444a69517a3bfbcb55506eb3485915c50a59d42043b2cf5d65e3afcc840b1be4863a8900245d1c8b0317d2a910c05d4852b49edababaaeeed8c42255285edd20412505b2c4fa07705d4ae2030a578c5aa8523df37f91e947fd8a1614b7063e6cd3b7e18910babd9a1747088e57fd039e084c592eb35e3bf2c11ff71cbbff4670f329cb5aac16b1b7d03095c4d4f121a5b22c8ad2f63ef12fce44fe1d0247dcf430c5feae678f9cc5c08e48521e4235116a9d5f64f2d8d96704907f316d56116fcfd1f1fac50e1cc88ca650422e360861c0d5e7b1fa4eff42f28dca9cc89c1fa4ba04113e290d4f6785791ad892447092747ecdaa17074ffe8ab343f4f1a13328b4e867d3945629e1f458b8650ab34234003cfcc671b372df18e2f0b1e514394b9dfc1d0d65d3887cbc2dd0d358fab4b4684774fb11b3ff236fa43f02754f01a5cadc85c3fd90656ad05a26653b6ab91390dce9c54f641c95c0e6ee52a0bdbf8cef55c9e7d1bfd023d6a4854e46795c0ad94956b762f00c40fc15a516a2f8cc258f9de125c836f83344c3c8b38cb9468bfae9eb1fe7bdbd3dfa1ff5aeef155366fea8259e885ceaf56d9d64fb0947553dfa5c991cd09bd6a43e6fba1fd18044b0dff0e98c37c176bdfb8401769855a7900ace2a7bde124ff9e7858fd086a2e649ba0f266ba20ab6ff2aa62976848617216efc270f811ae1f69593cb02f989816e016d5b7051267a77e6d37a01eefcd9f490846d74ff830806b3623cf8d2b4e3480d69056b1cb602adb5aa79f8316f95d15e22a568dda36dfe85e1b8478267ba22a35ceca918f890837f4f8e0c46d73b2561891068d5e42e2c8d67d65d97863efe5efa2e64014a3071e62e9a37acb683c9e6c4760d99a01c350686710a59615ee24563497a157f7c0f58cfbeb6d600411fd92e779bdf7624d1f76618f11269d987b1009cb019ee2d1a88dc22ff057c6ffbb83c9ca43071a4e88083b21b0248b429f5dbe5a9d68d36edec46fe111dd41e4dfd381f9cea72b338dcf2a0bd76dfc59abad529d79290c91f297d4964c2a847997545e21daa9439844328c32cbe607a48e66cab8e9f1edfa285dde5e9452e9aec0c60d14d492b8d7f086605e758ff6ba8c6817f32831c4c95ad04a46b2eda16a41ef41affba1cf9f43a8046419451144fd66f60cf762d0bf2779fb94b8cf2f92ea0700704b168f71a37c24480ad7a00ef0ec95ca4bfffc6238546cde011daba3f3a5ac0a017742a4853d7e0804be50121c604d1dbe1211dd963d759c9040e16c62aba5f5b2e14a3ebb497d13405d8a50bfb5ef2742c45e0f52b1ecb545bcb7d6a649ac6eb153584ee01772ec3bdc5085f5182236d6300957b8c06d2f8945f538e734b934799e2ce3303915ca109eaf9aeeadf5ee7d3e3a5f8fca5a52d77bc6ac083a6f511944fcdc33f1f2b3979160e46419be36a7a948aa722a724cd74149e75a47f897b2a75c21d123ffdb66a89df79dcf5ec080fbfe888030add9d3cff907577f0fd5d45d215341a3dd42a0d1423d0b4445fbd0a701b239b64f6cac7ac72824cfd7fe2e95824a18543a2b2d40e61fa9bfce0592a2be0deeeb1c4327d866e90737b3d5b28c7057a85c13e9f95f423c7a840c5dc561921dff2cccf12f0e0b660436c6caf7f4e20a3ba1b1edc31be30b92316647853be98223b43a4180b41fe06950bc7c7595a726e5d027b63da9ac9db6492fec73645a76b1d9baeda79408fef23c88fbd0e80369b01fe102b59f34199f1bdc5a9c716f22702c24733a14a09d3dd627a3d5df7b49d5f1596b79650441bc020570fffc26a569f621f31b5e811c782dd3f13dc1e7d0a2bd4c22716283e93518a2960096063ae6410511b8a89d6ddb2fb92d77ac3f8c57aa4c7547c02994b4ba0c78fed0ef23fb164a196d355ad99159661095144f55e4c5e91b52b42f558eff78c1e00c9faa97f6a2de7e16ffa6d5b6c492984b7aae844f3981c32e92f3412f2aec178755cb37e2a2c6d7aab9841bbc34080f84f0e5c60390e646304308dcfa33be3dc8b4098437466abce2becd12a2a1a15e04bd9cfe480c352930c310cd0f1b086c71f7ef7b52ae28c3d94d904352533163c608dfa42fd1bfac07b6155f3f5a370df2c5a99735bc8153a70b96b545118f3bd6a02a7bfd4f64d0c46560532cfd6a6833deddfbb2b69f28314bba9b6870c6c4584b06bcdce25dcf6be486349a64ba314719a0911fdcd57866ab7b1dee5d2c343d894673fc1b15a0584"}]}, @ETHTOOL_A_FEATURES_HEADER={0x4}]}, 0xec4}}, 0x0) 08:21:12 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) connect$rds(r0, &(0x7f0000000180)={0x2, 0x0, @dev}, 0x10) 08:21:12 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x17) 08:21:12 executing program 4: pipe(&(0x7f0000000100)) select(0x40, &(0x7f0000000180)={0x5}, &(0x7f00000001c0)={0x3}, &(0x7f0000000200)={0x9}, &(0x7f0000000240)={0x77359400}) 08:21:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 08:21:12 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_PAGE={0x5}, @NL802154_ATTR_CHANNEL={0x5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x2c}}, 0x0) [ 481.817355][T17127] loop1: detected capacity change from 0 to 7 08:21:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @loopback}]}, &(0x7f0000000140)=0x10) 08:21:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x18, 0x0, &(0x7f00000000c0)) 08:21:12 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:12 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x18, 0x1411, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x18}}, 0x0) 08:21:12 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0), 0x0, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @empty, 0x8, 0x700}}) 08:21:12 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x74) sendmmsg$inet(r0, &(0x7f0000007cc0)=[{{&(0x7f0000004f00)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000005180)=[@ip_retopts={{0x3c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x14, 0x2e, 0x3, 0x0, [{@empty}, {@empty}]}, @ra={0x94, 0x4}, @cipso={0x86, 0x11, 0x0, [{0x0, 0xb, "f9458208cead293daa"}]}]}}}], 0x40}}], 0x1, 0x0) 08:21:12 executing program 5: r0 = socket(0x2, 0x3, 0x1) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) 08:21:12 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') 08:21:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000)="ae", 0x1) 08:21:12 executing program 0: r0 = socket$inet(0x2, 0x3, 0x74) sendmmsg$inet(r0, &(0x7f0000007cc0)=[{{&(0x7f0000004f00)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000005180)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@ra={0x94, 0x4}, @cipso={0x86, 0x8, 0x0, [{0x0, 0x2}]}]}}}], 0x20}}], 0x1, 0x0) 08:21:12 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, '\x00', 0x10}}, 0x20) [ 482.404328][T17160] loop1: detected capacity change from 0 to 7 08:21:12 executing program 5: bpf$PROG_LOAD(0x1a, 0x0, 0x0) 08:21:12 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, &(0x7f0000000180)) 08:21:14 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:14 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8", 0x66, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:14 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$inet(r0, &(0x7f0000000c40)={&(0x7f0000000480)={0x2, 0x0, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000a80)=ANY=[], 0x1b8}, 0x0) 08:21:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x14, 0x0, &(0x7f00000000c0)) 08:21:14 executing program 4: socket(0x2c, 0x3, 0x9) 08:21:14 executing program 5: r0 = socket$inet(0x2, 0x3, 0x74) sendmmsg$inet(r0, &(0x7f0000007cc0)=[{{&(0x7f0000004f00)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000005180)=[@ip_retopts={{0x20, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x2e}, @ra={0x94, 0x4}, @cipso={0x86, 0x8, 0x0, [{0x0, 0x2}]}]}}}], 0x20}}], 0x1, 0x0) 08:21:14 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000000080)={'wlan1\x00'}) 08:21:14 executing program 5: write$nbd(0xffffffffffffffff, 0x0, 0x91) 08:21:14 executing program 0: recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x80002000) 08:21:14 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89a2, &(0x7f0000000080)={'wlan1\x00'}) [ 484.105044][T17202] loop1: detected capacity change from 0 to 7 08:21:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x20, &(0x7f0000000240)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x0, @local}]}, &(0x7f00000002c0)=0x10) 08:21:14 executing program 4: bpf$PROG_LOAD(0xd, 0x0, 0x0) 08:21:15 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, &(0x7f00000000c0)) 08:21:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x5, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 08:21:15 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000040)={@private0}) 08:21:15 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8", 0x66, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:15 executing program 4: socket(0x3, 0x0, 0xffffffff) 08:21:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 08:21:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000007280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000008680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 08:21:15 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c90c2, 0x0) 08:21:15 executing program 4: socket$l2tp6(0xa, 0x2, 0x73) pipe(&(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) [ 485.264381][T17239] loop1: detected capacity change from 0 to 7 08:21:15 executing program 3: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000280)) 08:21:15 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8", 0x66, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 485.613814][T17257] loop1: detected capacity change from 0 to 7 08:21:16 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 08:21:16 executing program 4: bpf$PROG_LOAD(0xa, 0x0, 0x0) 08:21:16 executing program 0: socket$inet_sctp(0x2, 0x0, 0x84) pipe(0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$phonet_pipe(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x20, &(0x7f0000000240)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x0, @remote}]}, &(0x7f00000002c0)=0x10) 08:21:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @local}}}}) 08:21:16 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec95185", 0x99, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:16 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x20004004) 08:21:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @empty, 0x0, 0x700}}) 08:21:16 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) [ 486.009865][T17280] loop1: detected capacity change from 0 to 7 08:21:16 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000008c0)={'wg2\x00'}) 08:21:16 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$sock_timeval(r0, 0x1, 0x43, 0x0, &(0x7f00000000c0)) 08:21:16 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, &(0x7f0000000340)) 08:21:17 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:17 executing program 0: bpf$PROG_LOAD(0x7, 0x0, 0x0) 08:21:17 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec95185", 0x99, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x208e24b) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) perf_event_open(&(0x7f0000001340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsu(&(0x7f0000000040), 0x6, 0x10802) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x20, 0x5, 0x7, 0x7f, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x200, 0xffffffffffffffe1, 0x2, 0x8, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xe, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff00f}], 0x5, 0x0, 0x0) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, 0x0, 0x0) 08:21:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000001c0)="440f01c2420f01c2440f300f013f66baf80cb8cea5438bef66bafc0c66b841e566ef460f12f866ba6100b8b28c0000efc421f9d7f4b9810a0000b800a43315ba63fb090b0f3066f3400f5e06"}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:17 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40010}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0x3}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 487.275289][T17318] loop1: detected capacity change from 0 to 7 08:21:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:17 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec95185", 0x99, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x208e24b) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) perf_event_open(&(0x7f0000001340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsu(&(0x7f0000000040), 0x6, 0x10802) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x20, 0x5, 0x7, 0x7f, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x200, 0xffffffffffffffe1, 0x2, 0x8, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xe, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff00f}], 0x5, 0x0, 0x0) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, 0x0, 0x0) [ 487.642977][T17348] (unnamed net_device) (uninitialized): up delay (3) is not a multiple of miimon (100), value rounded to 0 ms 08:21:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) symlink(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='./bus\x00') readlink(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280)=""/190, 0xbe) 08:21:18 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) [ 487.827701][T17366] loop1: detected capacity change from 0 to 7 [ 487.933493][T17351] (unnamed net_device) (uninitialized): up delay (3) is not a multiple of miimon (100), value rounded to 0 ms 08:21:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:18 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21", 0xb3, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:18 executing program 0: perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000580)=ANY=[], 0x10132) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000100)=0xffff, 0x4) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x2, 0x0) 08:21:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x208e24b) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) perf_event_open(&(0x7f0000001340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsu(&(0x7f0000000040), 0x6, 0x10802) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x20, 0x5, 0x7, 0x7f, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x200, 0xffffffffffffffe1, 0x2, 0x8, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xe, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff00f}], 0x5, 0x0, 0x0) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, 0x0, 0x0) [ 488.131236][ T26] audit: type=1326 audit(1639124478.516:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17365 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7ffc0000 08:21:18 executing program 4: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)) [ 488.247803][ T26] audit: type=1326 audit(1639124478.516:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17365 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7ffc0000 [ 488.305023][T17415] loop1: detected capacity change from 0 to 7 [ 488.453782][ T26] audit: type=1326 audit(1639124478.516:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17365 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fe0d3a5cb49 code=0x7ffc0000 08:21:19 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21", 0xb3, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:19 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$FUSE(r0, &(0x7f00000009c0)={0x2020}, 0x2020) 08:21:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 488.659928][ T26] audit: type=1326 audit(1639124478.576:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17365 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7ffc0000 08:21:19 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000004780), 0x0, 0x2) [ 488.885801][ T26] audit: type=1326 audit(1639124478.576:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17365 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe0d3a5cb49 code=0x7ffc0000 [ 489.038089][T17432] loop1: detected capacity change from 0 to 7 08:21:19 executing program 4: syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x80841) 08:21:19 executing program 0: perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000580)=ANY=[], 0x10132) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000100)=0xffff, 0x4) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x2, 0x0) 08:21:19 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:19 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000200)={0x20}, 0x10) write(r0, &(0x7f00000000c0)="240000001e00ff0214fffffffffffff80700000001000000000000000800080016000000", 0x24) 08:21:19 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21", 0xb3, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:19 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000002240)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000002280)=0x2) [ 489.728677][T17464] binder: 17455:17464 ioctl 4004662b 20002280 returned -22 [ 489.732279][T17458] loop1: detected capacity change from 0 to 7 08:21:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:20 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000200)={0x20}, 0x10) write(r0, &(0x7f00000000c0)="240000001e00ff0214fffffffffffff80700000001000000000000000800080016000000", 0x24) 08:21:20 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x208}, 0x0) 08:21:20 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851", 0xc0, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:20 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000002e40), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000000)) 08:21:20 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000200)={0x20}, 0x10) write(r0, &(0x7f00000000c0)="240000001e00ff0214fffffffffffff80700000001000000000000000800080016000000", 0x24) 08:21:20 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000004480)) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) syz_open_dev$vcsa(&(0x7f0000004780), 0x7c01, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000047c0), 0xffffffffffffffff) [ 490.430645][T17488] loop1: detected capacity change from 0 to 7 08:21:21 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:21 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) 08:21:21 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000200)={0x20}, 0x10) write(r0, &(0x7f00000000c0)="240000001e00ff0214fffffffffffff80700000001000000000000000800080016000000", 0x24) 08:21:21 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851", 0xc0, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x21}}], 0x1, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x1, 0x200000) 08:21:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x21}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x40000000, 0x0) 08:21:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) open(0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @private1}, 0x1c) [ 491.193225][T17513] loop1: detected capacity change from 0 to 7 08:21:21 executing program 0: syz_open_dev$vcsa(&(0x7f0000000400), 0x1, 0x0) 08:21:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x42}, 0x20) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 08:21:21 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851", 0xc0, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:22 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:22 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x109040, 0x0) 08:21:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x21}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x40000000, 0x0) 08:21:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000390400"/20, @ANYRES32=r2, @ANYBLOB="0b00000000000000280012800b000100627269646765"], 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3179, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) [ 491.643270][T17544] loop1: detected capacity change from 0 to 7 08:21:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:22 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd3917", 0xc6, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 491.813566][T17557] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:22 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x21}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x0, 0x0) 08:21:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x21}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x40000000, 0x0) [ 491.894880][T17564] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:22 executing program 0: syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x111003) 08:21:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 492.049965][T17574] loop1: detected capacity change from 0 to 7 08:21:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(r0, 0x0, 0x0) 08:21:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x21}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x40000000, 0x0) 08:21:22 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, 0xffffffffffffffff, 0x0) 08:21:22 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd3917", 0xc6, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:22 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@private, @in6=@rand_addr=' \x01\x00'}, {@in=@multicast2, 0x0, 0x6c}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2, 0x1}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 08:21:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:22 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 08:21:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, &(0x7f0000005000)={0x2020}, 0x2020) 08:21:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$NL80211_CMD_RADAR_DETECT(r2, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 492.758602][T17609] loop1: detected capacity change from 0 to 7 08:21:23 executing program 4: r0 = add_key$keyring(&(0x7f0000001c00), &(0x7f0000001c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000001c00), &(0x7f0000001c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x29) 08:21:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:23 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd3917", 0xc6, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:23 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop3', 0x120c0, 0x0) [ 493.220828][T17638] loop1: detected capacity change from 0 to 7 08:21:23 executing program 2: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000004347469bf93b39dbdff4ee3ba30ed85c6c9c840d5e33b70682e3c5bff44abe098e2e5f7aff74fd11efaa141336c2e9", @ANYRES32=0xee00, @ANYBLOB], 0xb0, 0x10080}, 0x0) 08:21:23 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000240)={'fscrypt:', @desc4}, &(0x7f0000000280)={0x0, "a4e6b3bd311aa886194a87af75004707b1df7dc07f631168c49e61dfd6ef2654330eda2ebeaee5ff2578a72b1afed451d32e1f1c35a69759827dc3a258443a48"}, 0x48, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000001c00), &(0x7f0000001c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0xfffffffffffffffc) 08:21:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:23 executing program 4: pipe2$9p(&(0x7f0000000000), 0x0) 08:21:23 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23c", 0xc9, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:23 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 493.593627][T17661] loop1: detected capacity change from 0 to 7 08:21:24 executing program 0: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0) 08:21:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f000000f3c0)={0x0, 0x0, &(0x7f000000f380)={0x0, 0x20}}, 0x0) 08:21:24 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x48301, 0x0) 08:21:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:24 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23c", 0xc9, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:24 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 08:21:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x2004c0d5, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) dup3(r1, r0, 0x0) 08:21:24 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000240)={'fscrypt:', @desc4}, &(0x7f0000000280)={0x0, "a4e6b3bd311aa886194a87af75004707b1df7dc07f631168c49e61dfd6ef2654330eda2ebeaee5ff2578a72b1afed451d32e1f1c35a69759827dc3a258443a48"}, 0x48, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000001c00), &(0x7f0000001c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) [ 493.965169][T17676] loop1: detected capacity change from 0 to 7 08:21:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:24 executing program 0: mq_open(&(0x7f0000000080)=':!:\x00', 0x40, 0x0, &(0x7f00000000c0)) 08:21:24 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23c", 0xc9, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:24 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 08:21:24 executing program 5: request_key(&(0x7f0000000100)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0) 08:21:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:24 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002c80)='/sys/bus/container', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r1, 0x0) 08:21:24 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='^\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001640)=""/49) ioprio_get$pid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 08:21:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f000000f3c0)={0x0, 0x0, &(0x7f000000f380)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB='\f'], 0x20}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r0) 08:21:24 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x42802, 0x0) [ 494.487854][T17708] loop1: detected capacity change from 0 to 7 08:21:24 executing program 0: pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 08:21:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 08:21:25 executing program 4: socketpair(0x1, 0x0, 0x80, 0x0) 08:21:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0xffffffffffffffff) 08:21:25 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7", 0xcb, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, 0x0, 0x0) 08:21:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080)) 08:21:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x40000041, 0x0, 0x0) 08:21:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 494.972733][T17742] loop1: detected capacity change from 0 to 7 08:21:25 executing program 5: clock_gettime(0x3, &(0x7f0000000240)) 08:21:25 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7", 0xcb, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:25 executing program 0: r0 = add_key$keyring(&(0x7f0000001c00), &(0x7f0000001c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0xfffffffffffffffc) 08:21:25 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 08:21:25 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001640)='/proc/bus/input/handlers\x00', 0x0, 0x0) write$apparmor_current(r0, 0x0, 0x0) 08:21:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 08:21:25 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x42802, 0x0) write$FUSE_ENTRY(r0, 0x0, 0x0) 08:21:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) [ 495.423280][T17764] loop1: detected capacity change from 0 to 7 08:21:25 executing program 5: timer_create(0x0, 0x0, &(0x7f0000001180)) 08:21:25 executing program 2: setpriority(0x0, 0x0, 0x1) 08:21:25 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 08:21:26 executing program 0: r0 = add_key$keyring(&(0x7f0000001c00), &(0x7f0000001c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 08:21:26 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7", 0xcb, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:26 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000002c40)='ns/cgroup\x00') 08:21:26 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/8250', 0x210002, 0x0) 08:21:26 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 08:21:26 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000240)={'fscrypt:', @desc4}, &(0x7f0000000280)={0x0, "a4e6b3bd311aa886194a87af75004707b1df7dc07f631168c49e61dfd6ef2654330eda2ebeaee5ff2578a72b1afed451d32e1f1c35a69759827dc3a258443a48"}, 0x48, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r0) 08:21:26 executing program 0: r0 = getpgrp(0x0) sched_rr_get_interval(r0, &(0x7f0000000080)) 08:21:26 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000001100), 0x0) 08:21:26 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 08:21:26 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/ipc\x00') 08:21:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r0, &(0x7f0000000040)) [ 496.010945][T17800] loop1: detected capacity change from 0 to 7 08:21:26 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x42, 0x0) 08:21:26 executing program 4: request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='fscrypt:', 0xffffffffffffffff) 08:21:26 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:26 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 08:21:26 executing program 5: recvmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000400)) 08:21:26 executing program 2: timer_create(0x0, &(0x7f0000001080)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000010c0)) 08:21:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) accept(r0, 0x0, 0x0) 08:21:26 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 08:21:26 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000018c0), 0x2, 0x0) 08:21:26 executing program 5: openat$bsg(0xffffffffffffff9c, 0x0, 0x4241, 0x0) 08:21:26 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x9}, &(0x7f0000000100)={0x0, r0+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x100000000]}, 0x8}) [ 496.456499][T17831] loop1: detected capacity change from 0 to 7 08:21:26 executing program 0: sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, 0x0, 0x3c83b036b83dc541) 08:21:27 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 08:21:27 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0xffffffffffffffa4}}, 0x0) 08:21:27 executing program 2: rt_sigtimedwait(&(0x7f00000003c0), 0x0, &(0x7f0000000480), 0x8) 08:21:27 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x100000000]}, 0x8}) 08:21:27 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000004cc0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000004d00)=ANY=[]) 08:21:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:27 executing program 4: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) 08:21:27 executing program 0: r0 = add_key$keyring(&(0x7f0000001c00), &(0x7f0000001c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$read(0xb, r1, 0x0, 0x0) 08:21:27 executing program 2: r0 = add_key$keyring(&(0x7f0000001c00), &(0x7f0000001c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) [ 496.954362][T17857] loop1: detected capacity change from 0 to 7 08:21:27 executing program 5: r0 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}, 0x4}, @isdn={0x22, 0x1f, 0x8, 0x6, 0x5}, @generic={0x2b, "741e777bfd5d72578542f1a2a26e"}, 0xffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='veth0_to_bridge\x00', 0x9, 0x3fc, 0x800}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x8801}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3f9aac2fe1a135aa136e2c020d69d843141b470500f428875441e382a92d1aef6dc1403bec077c", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fddbdf250c00000008003b000900000008000b000007000500000000002ba3117ff33559627255a066002f3e000008003900040000000800390000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4010041}, 0x24000080) 08:21:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:27 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:27 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002c80)='/sys/bus/container', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, 0x0, 0x0) 08:21:27 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x202040, 0x0) 08:21:27 executing program 2: accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x238c3644f18abde2) 08:21:27 executing program 5: add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 08:21:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={0x0}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001140), 0xffffffffffffffff) [ 497.409734][T17887] loop1: detected capacity change from 0 to 7 08:21:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="020a00051100000027bd7000fcdbdf2505000900e000000076f0fea6a4b7973851b33d67e44a92acc5a270cc50f23eba62fd6e93c13c8073de"], 0x88}}, 0x0) 08:21:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 08:21:27 executing program 5: keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000017c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 08:21:28 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:28 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 08:21:28 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000001540)='/sys/kernel/rcu_expedited', 0x40041, 0x0) 08:21:28 executing program 0: timer_create(0x0, &(0x7f0000001140)={0x0, 0x0, 0x4}, 0x0) 08:21:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x20, &(0x7f0000000080)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e21}]}, &(0x7f0000000140)=0x10) 08:21:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) recvmsg$unix(r0, &(0x7f0000007880)={0x0, 0x0, 0x0}, 0x40000042) 08:21:28 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 497.871001][T17913] loop1: detected capacity change from 0 to 7 08:21:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f000000f3c0)={0x0, 0x0, &(0x7f000000f380)={&(0x7f000000f300)={0x14, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) recvfrom(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 08:21:28 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x80200, 0x0) 08:21:28 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180), r0) 08:21:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001400)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_PEERS={0x798, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @loopback}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @remote}}]}, {0x1c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_FLAGS={0x8}]}, {0x94, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}, @WGPEER_A_PUBLIC_KEY={0x24}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "a37b1f295641eed8a2240e61adfde2484f29b33a5740817833ae48fca08e2654"}]}, {0x5dc, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x1e0, 0x9, 0x0, 0x1, [{0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x39c, 0x9, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_FLAGS={0x8}]}, {0xa0, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "53c5645322901f2188b9f48b0cb01a0e646a0bd20b0596382eb9b4cd97005e83"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @remote}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "49e2f2fcd01f5ac5462d94200319ea0710042a1baec6f677127aae68db7cb533"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}]}]}, @WGDEVICE_A_PEERS={0x3a8, 0x8, 0x0, 0x1, [{0x1fc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "730ca8528bace2698bbda6f9f6ce99fb08079d7682a67586bac3b0f67ac37544"}, @WGPEER_A_ALLOWEDIPS={0x68, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0xa4, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x68, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "398dc577bab2fc2a4d1d86242b512c2a5731636a4d80ca9db11e2958c6ae8e5d"}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x34, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private1}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x74, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d10af02485725135bedb5cba3ba12c0732a10ac7c769aaea2c588a277b0fa640"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @loopback}}]}, {0xd0, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "687eda37ddad7dc8c97d0976f827444d50c75259a0817d574baa70d343f36233"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "96b614d75c601b19c6a6b9bc9fdb6c241418a3ffddfc689730ce60df7a9a9f00"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @WGPEER_A_FLAGS={0x8}]}, {0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast2}}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x338, 0x8, 0x0, 0x1, [{0x1c8, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f06f9c3150a9870ae8b8f3588faf7c689dcd7177e1729d05ddc245a703cc23fc"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "c28b7aa7c6a295306376affabe40d8af28fc142e6ac9f3aaff5c5de205ec87ab"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ALLOWEDIPS={0x114, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}, {0x16c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_ALLOWEDIPS={0x148, 0x9, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}]}]}]}]}, 0xec4}}, 0x0) 08:21:28 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000120007031dfffd946fa2720008001900ff07000000000000201ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:21:28 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000000d80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x20}}], 0x1, 0x0) 08:21:28 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 08:21:28 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 08:21:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000077c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, 0x0) [ 498.290317][T17947] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 08:21:28 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000004700), 0x0, 0x0) 08:21:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 498.339715][T17947] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:28 executing program 4: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='-&\x00]0\x94\x8bK\xdf\x8cm\x05\xa5\xc5@\x16\xc5\xb6&\xbc\xf5\x0e\xac;\xfb\xabP\x9b\xd7x\xe0\xce\xee\xdc\xa4\x88J\x97h\xe2K\xdb\xed\x16>\xcd\xa2\xec\\&\x05;\xf0\xe3\v\x1aW}\xb3q`)\x01\x91\xecAv\xadURB\xcfsI\xa5\xcah\xc7\x9d\xbd\xb0\xd8\'\xb9$\xcb\xd8\x88\xdc\x87\xe1\xd7.\xbbT\xb5y;\xcf\x80\x94&Ad\x92\xa6\xf9\xd2G\xe7\x95s\t+\xc8\xbe\x8bW\ad\x13u`\xaa\xd0k', 0xfffffffffffffffb) [ 498.398725][T17947] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 498.430600][T17947] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 498.440231][T17951] loop1: detected capacity change from 0 to 7 08:21:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000120007031dfffd946fa2720008001900ff07000000000000201ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:21:29 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x4, &(0x7f0000000bc0)=[{&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:29 executing program 4: r0 = add_key$keyring(&(0x7f0000001c00), &(0x7f0000001c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "12ff9532fbf794cd9a3a182cfa210b86d276613a3bb4edfe5293cf2d4f5dace5dbeedea1d9096bd88471dc4effc8a076eed8f33c2d5d2164c315d1a68acca486"}, 0x48, r0) keyctl$describe(0x6, r1, &(0x7f00000001c0)=""/24, 0x18) 08:21:29 executing program 2: r0 = add_key$keyring(&(0x7f0000001c00), &(0x7f0000001c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 08:21:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 498.744070][T17974] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 08:21:29 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 08:21:29 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002c80)='/sys/bus/container', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 498.798926][T17974] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000120007031dfffd946fa2720008001900ff07000000000000201ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 498.942113][T17982] loop1: detected capacity change from 0 to 7 [ 499.037633][T17995] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 499.057815][T17995] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:29 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 08:21:29 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x17, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x7, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}}]}, 0x38}}, 0x0) 08:21:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:29 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000fc0)='/proc/crypto\x00', 0x0, 0x0) 08:21:29 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x0, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000120007031dfffd946fa2720008001900ff07000000000000201ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:21:29 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000000)={0x2, 0x12, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}]}, 0x18}}, 0x0) [ 499.364744][T18009] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 08:21:29 executing program 2: prctl$PR_MCE_KILL(0x21, 0x1b6737b0a42412d2, 0x0) 08:21:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 499.418736][T18009] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000340)={'ip6_vti0\x00', 0x0}) 08:21:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', 0x141240, 0x0) [ 499.485250][T18010] loop1: detected capacity change from 0 to 7 [ 499.517938][T18010] kAFS: unparsable volume name 08:21:30 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x0, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:30 executing program 4: keyctl$search(0xa, 0x0, &(0x7f00000017c0)='syzkaller\x00', &(0x7f0000001800)={'syz', 0x3}, 0xfffffffffffffff9) 08:21:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:30 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, 0x0) 08:21:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(r0, 0x0, 0x0, 0x40000142, 0x0, 0x0) 08:21:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f000000f3c0)={0x0, 0x0, &(0x7f000000f380)={&(0x7f000000f300)={0x14, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:30 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 08:21:30 executing program 2: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) 08:21:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 499.928131][T18044] loop1: detected capacity change from 0 to 7 08:21:30 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000040), 0x80000010, 0x0) [ 499.970969][T18044] kAFS: unparsable volume name 08:21:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) getsockname$packet(r0, 0x0, 0x0) 08:21:30 executing program 4: socket$packet(0x11, 0x2, 0x300) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:30 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x0, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001b40)=ANY=[], 0x8c}}, 0x0) 08:21:30 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, "35e8fda41fef0fdd5d7eb72a6bef56469059036e8ad250c95a90b1e6543c47386409e5c41385c38378fb2e695a3af48839b88ec9cb0678b40cb52515c4e4f5ed"}, 0x48, 0xfffffffffffffffb) 08:21:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:30 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, 0x0) 08:21:30 executing program 4: mq_notify(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) 08:21:30 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000fc0)='/proc/stat\x00', 0x0, 0x0) [ 500.366044][T18075] loop1: detected capacity change from 0 to 7 [ 500.405042][T18075] kAFS: unparsable volume name 08:21:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f000000f040)) 08:21:30 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:31 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x301200, 0x0) 08:21:31 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000001740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 08:21:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) fchdir(r0) 08:21:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:31 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 08:21:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000008b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4044) 08:21:31 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000017c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001900)={'wlan0\x00'}) 08:21:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001200)=ANY=[], 0x28}}, 0x0) [ 500.873308][T18106] loop1: detected capacity change from 0 to 7 08:21:31 executing program 5: mq_notify(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}) 08:21:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:31 executing program 2: add_key$keyring(&(0x7f00000017c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000001c00), &(0x7f0000001c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 08:21:31 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000000)={0x2, 0x12, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}, @sadb_ident={0x2, 0xa}, @sadb_ident={0x2, 0xa}]}, 0x38}}, 0x0) 08:21:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x17, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 501.155047][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.161386][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 08:21:31 executing program 5: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, 0x0) 08:21:31 executing program 2: socket(0x1, 0x0, 0x7) 08:21:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:21:31 executing program 4: pselect6(0x40, &(0x7f0000000000)={0x1}, 0x0, &(0x7f0000000080)={0x4}, 0x0, 0x0) 08:21:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:31 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) 08:21:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8932, &(0x7f0000000080)) [ 501.459078][T18145] loop1: detected capacity change from 0 to 7 08:21:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) 08:21:32 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x71, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000001400)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000064eec2a69d636a4d1b4dc005edb48abaf6e18989142228479db2545ba21c1fc850d58493a2811c1366eb6b653a4674f7add9b15cc0bf6b8dbe7210f94d9c32ce02c9a8d7fbb4bcf9b47811bdb5f8e38a3d5ac272ccfd301ffed33aefe87bd371e1254bba51ccb35a041ce80bc12255d9e846186008239ededf4d4e1f61d5130600a18153a761fe7eac4101b0e58d4f1730fe04bb4eef522a8d827c9c8a871cd28454c9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r0, r1, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@cgroup=r0, 0xffffffffffffffff, 0x2}, 0x10) 08:21:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8932, &(0x7f0000000080)) [ 501.846225][T18163] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 501.891164][T18163] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 501.975792][T18163] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 08:21:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 502.106453][T18179] loop1: detected capacity change from 0 to 7 [ 502.109168][T18169] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 08:21:32 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x3) [ 502.163401][T18169] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 502.217889][T18169] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) 08:21:32 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) 08:21:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) 08:21:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 08:21:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 08:21:33 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002d40)=[{0x0}, {&(0x7f0000001b80)=',', 0x1}], 0x2}}], 0x1, 0x0) [ 502.643978][T18212] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 502.676157][T18211] loop1: detected capacity change from 0 to 7 [ 502.694796][T18212] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:33 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002d40)=[{0x0}, {&(0x7f0000001c80)='7', 0x1}], 0x2}}], 0x1, 0x0) 08:21:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) 08:21:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:33 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0xa8, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x8c, 0x33, @action={@with_ht={{{}, {}, @broadcast, @device_b}}, @tdls_teardown={0xc, 0x3, {0x0, {0x37, 0x52, {0x0, 0x0, "73375d772eac389d930e1f788c84de84", "4cb0c4494dac78f6b24fae2e0c424b57a778c039e7a4aae38c5bb7a63967a792", "113254210a3240024b10a1570daf1694fc7dbda9f1455b0f84c73620f716d67a"}}, {0x65, 0x12, {@from_mac=@broadcast, @device_a, @broadcast}}}}}}]}, 0xa8}}, 0x0) 08:21:33 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100027516b7108c0d0e008fb60102430109021b0001000000000904000001030000000905846704"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000540)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x49, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0}) 08:21:33 executing program 5: r0 = syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x4, "", {{{0x9, 0x5, 0x1, 0x2, 0x0, 0x1f}}}}}]}}]}}, 0x0) syz_usb_control_io$printer(r0, &(0x7f0000000840)={0x14, 0x0, &(0x7f0000000800)={0x0, 0x3, 0x13, @string={0x13, 0x3, "7e178fc98e95374f28e11f6cad944513ce"}}}, &(0x7f0000000b40)={0x34, &(0x7f0000000880)={0x0, 0x17, 0x7b, "7d469dc3192e17b36da1527f62b98dc7dc52979e5af724f8ab18ce9575e1943f03ae356678805e63c9af9b9a4a97df75a3fe6f7e3409eba6db0fcd0feaf00053bbba396e017bbe19ce46b4c9c899c77262039da388170f8f5c1e9becb920b28bcc5e2d55862f3a31329eb58ea48493a0ed679d50c22a9793ba0324"}, &(0x7f0000000940)={0x0, 0xa, 0x1}, 0x0, &(0x7f00000009c0)={0x20, 0x0, 0x9b, {0x99, "c9c37187b6ff45e8600e954f2be29f0e7276ed36a846352e3450c47ae233684bf9b4307248e4fdbd34c3a0ce109033ab43d9eff29badfa08f51c18050a75dce68eab8c35b9009e0de647f4cea32635c640c962a534d8b9d36ff907563bb88eaa240bec79b4e4ec9b91d2bfacc8b160d10d29e414f677290da4071696bca506eeb0bd0a5e837fd4d6acdd88a2ebba5df938f1cd4b3691f82cd7"}}, 0x0, &(0x7f0000000b00)={0x20, 0x0, 0x1}}) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) syz_usb_connect$uac1(0x0, 0xa3, &(0x7f0000002e00)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x91, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@input_terminal={0xc, 0x24, 0x2, 0x6, 0x0, 0x6, 0x0, 0x0, 0x7, 0x9}, @output_terminal={0x9, 0x24, 0x3, 0x0, 0x101, 0x6, 0x4, 0xf1}, @feature_unit={0x9, 0x24, 0x6, 0x0, 0x3, 0x1, [0x0], 0x8}, @input_terminal={0xc, 0x24, 0x2, 0x0, 0x200, 0x0, 0x1, 0x0, 0x2}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0x8, 0x24, 0x2, 0x1, 0x3f, 0x0, 0x0, 0x40}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x99, 0xff, 0x81, {0x7, 0x25, 0x1, 0x0, 0x0, 0x1ff}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x200, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f00000030c0)={0xa, &(0x7f0000002f00)={0xa, 0x6, 0x0, 0x8, 0x6}, 0x0, 0x0}) [ 503.108732][T18243] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x5760, 0x0) write$binfmt_elf64(r2, 0x0, 0xa27) write$binfmt_elf64(r1, 0x0, 0x0) 08:21:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) [ 503.350972][T18252] loop1: detected capacity change from 0 to 7 08:21:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:33 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x5760, 0x0) write$binfmt_elf64(r2, 0x0, 0xa27) write$binfmt_elf64(r1, 0x0, 0x0) [ 503.524111][ T7948] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 503.590600][T18272] validate_nla: 3 callbacks suppressed [ 503.590675][T18272] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 503.606589][ T7914] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 503.618632][T18272] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 503.649268][T18272] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5}, 0x38) [ 503.794441][T18282] loop1: detected capacity change from 0 to 7 [ 503.815465][ T7948] usb 3-1: Using ep0 maxpacket: 16 [ 503.884883][ T7914] usb 6-1: Using ep0 maxpacket: 8 [ 503.936829][ T7948] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 7 08:21:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x5760, 0x0) write$binfmt_elf64(r2, 0x0, 0xa27) write$binfmt_elf64(r1, 0x0, 0x0) 08:21:34 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 504.024738][ T7914] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 08:21:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 504.162000][T18304] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 504.173141][ T7948] usb 3-1: New USB device found, idVendor=0d8c, idProduct=000e, bcdDevice=b6.8f [ 504.188361][ T7948] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=67 [ 504.202842][T18304] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 504.216278][ T7948] usb 3-1: Product: syz [ 504.225265][ T7948] usb 3-1: Manufacturer: syz [ 504.231361][T18304] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. [ 504.247738][ T7948] usb 3-1: SerialNumber: syz [ 504.266070][ T7948] usb 3-1: config 0 descriptor?? [ 504.274859][ T7914] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 504.296520][ T7914] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 504.332133][ T7914] usb 6-1: Product: syz [ 504.345930][ T7914] usb 6-1: Manufacturer: syz [ 504.358066][ T7948] input: CM109 USB driver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/input/input15 [ 504.371279][ T7914] usb 6-1: SerialNumber: syz [ 504.379501][T18315] loop1: detected capacity change from 0 to 7 [ 504.777085][T18251] UDC core: couldn't find an available UDC or it's busy: -16 [ 504.789283][T18251] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 504.835376][T16877] usb 3-1: USB disconnect, device number 5 [ 504.865577][T16877] cm109 3-1:0.0: cm109_toggle_buzzer_sync: usb_control_msg() failed -19 [ 504.877840][T18259] UDC core: couldn't find an available UDC or it's busy: -16 [ 504.885841][T18259] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 504.902995][ T7914] usb 6-1: USB disconnect, device number 3 [ 505.603984][T16876] usb 3-1: new high-speed USB device number 6 using dummy_hcd [ 505.684089][ T7914] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 505.843923][T16876] usb 3-1: Using ep0 maxpacket: 16 [ 505.953925][ T7914] usb 6-1: Using ep0 maxpacket: 8 [ 505.965265][T16876] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 7 [ 506.084129][ T7914] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 08:21:36 executing program 2: socket$key(0xf, 0x3, 0x2) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001200)={0xffffffffffffffff, 0x9, 0x100000001, 0x6}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000040)=@fragment={0x87, 0x0, 0x5, 0x0, 0x0, 0x0, 0x64}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000000000000000000ffff000095000000000000000600000001591a6721677962198ff70001000000000000c1766c7fd399e7ef6b919ecc600cb670c3a724b27174883708e15c8e6e4293f9680642ba0ea48fe8ab7e64bd3d050200758c3b07b1b30a26881302000000c54fccae010718feffa8100c6c519885901df31370c1ad105bda2e72e008280468a41cf63430c44fbe0000000077b9fe85d561ecd7114e8c6d504dd200000000d0c501c6368e35a2a88406"], &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000d80), 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x4c, 0x4, 0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) sendmmsg$sock(r0, &(0x7f0000001380)=[{{&(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0, 0x40003d}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000700)=[@timestamping={{0x14, 0x1, 0x25, 0x6f3c8b1f}}, @mark={{0x14, 0x1, 0x24, 0x800}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x18001}}], 0x60}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000600)="34cb3bd9241dd8d331f1ef581b56fdb4d4410c125acfbf5de38659d1d0d4d7cf4e32121b1a62272de2e8cf8464e60cda952cd14e5563", 0x36}, {&(0x7f0000000780)="3bf79fb55dd274990e6baaaf779aaa7b1efd521412db71475855cf82f8421dbd06f5555ffbc7e9d796eb55e1f9310b2f255f9d94b8ccf06632ee350c1e17425ed7ad5b646523bfce4c525e500fba6d21083531dc10f2b41f655a9d944f9d6d5a0932d68e439e1cd4758e369642eac9b1b16d5e70b72b01c88960aeddc0775d8f5243e4c76b22fe5e4b6567b9a620d9538839d113eaffaad404778ee124a7e1596d5d8f4eb200f7e975c15b44c2299f", 0xaf}, {&(0x7f0000000440)="b93db7f12cc56791978358ab407d64ff1f5db4f8e7b98e9be43c097436b5d01aa58c038809a4ae963f7a035e506d8473c72d85ce58dcf8739c3c783c928e23ec6e7a4e5d4cd1c9086c3b9da4d509b0e732830b91555d6e82ef16598548d3e4a39699158a57c965438d0b89e2e7bd8caa81171d1c24b49b7389476683b32342f817064961009d56d44a1381c9e0cb58b5", 0x90}], 0x3, &(0x7f0000000940)=[@timestamping={{0x14, 0x1, 0x25, 0x6755}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0xf237}}, @mark={{0x14, 0x1, 0x24, 0x6}}], 0xa8}}, {{&(0x7f0000000a00)=@l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a80)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0xa5d}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x60}}, {{&(0x7f0000000b00)=@nfc={0x27, 0x1, 0x2, 0x2}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000b80)="8045e37ecf036d57326a02af46959a7cda91839722ed3b44d0ef23c25b130b8b28105be6fb42372ac86754e4d3a427c33d4c24e3db277ec44a67402311779c85af50069faa1b5f5f5062eccc5ed40c172aa6d4a4df925baa4e897df56892a832a75be5f9c92086ec244cbf23043f68abe35c14d8ace5c6d715d2f065c1aece5807c367397c14c9ecde18af32b071efac3bafacc89bdd1aa247674dc53b4fdf4ec9a3bd1398ce25dd471371b853c3a1da512256b2935e0c924e548469e938b123664e55ce117c94dcef0f883962c78284b21eaae601333371ffce4ebd1bd4014f6fe504", 0xe3}, {&(0x7f0000000380)="d219c152ce0e9e3178cea20f6a98343a7368693fd4a505dec3bdc1976064da1d1fe12a0bbccf8d3ab922cd49f695ec2d73248233338c10f4725af43820d5da06b5a767cf4d6f28c3ccb1ac0164e420cd562129723c585c62854b6b1ea592406a7630c54150b6e56cbb5eae4f64a62f635917517c28535df65864c26a2338a3fef00fa335420c914dcfb2a7de10b6136fad8a742ef16dba44b96c0a34ca994b74134ca66daee9d8", 0xa7}, {&(0x7f0000001240)="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", 0x105}], 0x3, &(0x7f0000000e40)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x94e}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x8000000000007}}, @mark={{0x14, 0x1, 0x24, 0x8000}}], 0x90}}, {{&(0x7f0000000f00)=@hci={0x1f, 0xffffffffffffffff, 0x1}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000f80)="7018bccd9d8fec8c34a460520d0e60d281414c1500c50f6c438ea448a6291b2197e6ab6efa3c006d7c7844e1d769", 0x2e}, {&(0x7f0000000fc0)="ca86af51c5c7ec23dff665191f4054d8c5503ca492cd33a99cbb8b82542c6ee9f87233f546014526df43c0fec7f89d1f9cd8f7c303c40cf94a9975f2c912c411e107f7b82e17a5c0ca395db3e691bf6075e29b979c39fda6854adf7a36f7494d4733d73325b598ef0b78afaeb1932d4ef05d0d94b90a40c23d1b8d8727c2e217648cb187d0118cc9", 0x88}], 0x2}}, {{&(0x7f0000000500)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000840)="6b107e081564ee8f389eb452463a2cce06fb31a911509d55cfe11e4969d46aca461a68b8d08fc1d5bc4a879ad4d57acc266dcaf338fdb01800889c85a6a8a12001174fda12da20e848ee0f4c42b7b48b408bc30ce6d71e2c355d10fd628cf239d146fbb8d7ae65e7a695803a8818119d2fed3864fa120c6de88d5afa7843b9846fc25491c0bf4caeaef7bb3818c2ef65764b1ad579f4748d31b7b2f29fb4fc1f5e85e4755bec5c233522deb8e5270e0309c8", 0xb2}], 0x1, &(0x7f0000000100)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x10001}}], 0x30}}], 0x6, 0x8000001) 08:21:36 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000001c0)={0x20}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0xfe6f) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r1, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000003380)={0x77359400}) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f0000003480)={0xffffffffffffffff, 0x0, &(0x7f0000003440)={&(0x7f00000033c0)={0x60, 0x2, 0x8, 0x3, 0x0, 0x0, {0x2}, [@CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xfffffffe}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x101}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6004}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_ESTABLISHED={0x8, 0x3, 0x1, 0x0, 0x7ff}, @CTA_TIMEOUT_TCP_SYN_RECV={0x8, 0x2, 0x1, 0x0, 0xffffffff}]}]}, 0x60}}, 0x4000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000300)='dctcp\x00', 0x6) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) 08:21:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5}, 0x38) 08:21:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x5760, 0x0) write$binfmt_elf64(r2, 0x0, 0xa27) write$binfmt_elf64(r1, 0x0, 0x0) 08:21:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:36 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 506.193848][T16876] usb 3-1: New USB device found, idVendor=0d8c, idProduct=000e, bcdDevice=b6.8f [ 506.203272][T16876] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=67 [ 506.291089][T16876] usb 3-1: Product: syz [ 506.304923][ T7914] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 506.326782][T16876] usb 3-1: Manufacturer: syz [ 506.338240][ T7914] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 506.379344][T16876] usb 3-1: config 0 descriptor?? [ 506.407607][ T7914] usb 6-1: Product: syz [ 506.454504][T16876] usb 3-1: can't set config #0, error -71 [ 506.474105][ T7914] usb 6-1: can't set config #1, error -71 [ 506.528043][T16876] usb 3-1: USB disconnect, device number 6 [ 506.556311][ T7914] usb 6-1: USB disconnect, device number 4 [ 506.569486][T18377] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 506.596425][T18374] loop1: detected capacity change from 0 to 7 [ 506.655964][T18377] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 08:21:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x5760, 0x0) write$binfmt_elf64(r1, 0x0, 0xa27) [ 506.843601][T18377] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) 08:21:37 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5}, 0x38) 08:21:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 507.309601][T18420] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 507.349105][T18420] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 507.369362][T18420] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:37 executing program 2: socket$key(0xf, 0x3, 0x2) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001200)={0xffffffffffffffff, 0x9, 0x100000001, 0x6}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000040)=@fragment={0x87, 0x0, 0x5, 0x0, 0x0, 0x0, 0x64}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000000000000000000ffff000095000000000000000600000001591a6721677962198ff70001000000000000c1766c7fd399e7ef6b919ecc600cb670c3a724b27174883708e15c8e6e4293f9680642ba0ea48fe8ab7e64bd3d050200758c3b07b1b30a26881302000000c54fccae010718feffa8100c6c519885901df31370c1ad105bda2e72e008280468a41cf63430c44fbe0000000077b9fe85d561ecd7114e8c6d504dd200000000d0c501c6368e35a2a88406"], &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000d80), 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x4c, 0x4, 0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) sendmmsg$sock(r0, &(0x7f0000001380)=[{{&(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0, 0x40003d}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000700)=[@timestamping={{0x14, 0x1, 0x25, 0x6f3c8b1f}}, @mark={{0x14, 0x1, 0x24, 0x800}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x18001}}], 0x60}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000600)="34cb3bd9241dd8d331f1ef581b56fdb4d4410c125acfbf5de38659d1d0d4d7cf4e32121b1a62272de2e8cf8464e60cda952cd14e5563", 0x36}, {&(0x7f0000000780)="3bf79fb55dd274990e6baaaf779aaa7b1efd521412db71475855cf82f8421dbd06f5555ffbc7e9d796eb55e1f9310b2f255f9d94b8ccf06632ee350c1e17425ed7ad5b646523bfce4c525e500fba6d21083531dc10f2b41f655a9d944f9d6d5a0932d68e439e1cd4758e369642eac9b1b16d5e70b72b01c88960aeddc0775d8f5243e4c76b22fe5e4b6567b9a620d9538839d113eaffaad404778ee124a7e1596d5d8f4eb200f7e975c15b44c2299f", 0xaf}, {&(0x7f0000000440)="b93db7f12cc56791978358ab407d64ff1f5db4f8e7b98e9be43c097436b5d01aa58c038809a4ae963f7a035e506d8473c72d85ce58dcf8739c3c783c928e23ec6e7a4e5d4cd1c9086c3b9da4d509b0e732830b91555d6e82ef16598548d3e4a39699158a57c965438d0b89e2e7bd8caa81171d1c24b49b7389476683b32342f817064961009d56d44a1381c9e0cb58b5", 0x90}], 0x3, &(0x7f0000000940)=[@timestamping={{0x14, 0x1, 0x25, 0x6755}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0xf237}}, @mark={{0x14, 0x1, 0x24, 0x6}}], 0xa8}}, {{&(0x7f0000000a00)=@l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a80)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0xa5d}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x60}}, {{&(0x7f0000000b00)=@nfc={0x27, 0x1, 0x2, 0x2}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000b80)="8045e37ecf036d57326a02af46959a7cda91839722ed3b44d0ef23c25b130b8b28105be6fb42372ac86754e4d3a427c33d4c24e3db277ec44a67402311779c85af50069faa1b5f5f5062eccc5ed40c172aa6d4a4df925baa4e897df56892a832a75be5f9c92086ec244cbf23043f68abe35c14d8ace5c6d715d2f065c1aece5807c367397c14c9ecde18af32b071efac3bafacc89bdd1aa247674dc53b4fdf4ec9a3bd1398ce25dd471371b853c3a1da512256b2935e0c924e548469e938b123664e55ce117c94dcef0f883962c78284b21eaae601333371ffce4ebd1bd4014f6fe504", 0xe3}, {&(0x7f0000000380)="d219c152ce0e9e3178cea20f6a98343a7368693fd4a505dec3bdc1976064da1d1fe12a0bbccf8d3ab922cd49f695ec2d73248233338c10f4725af43820d5da06b5a767cf4d6f28c3ccb1ac0164e420cd562129723c585c62854b6b1ea592406a7630c54150b6e56cbb5eae4f64a62f635917517c28535df65864c26a2338a3fef00fa335420c914dcfb2a7de10b6136fad8a742ef16dba44b96c0a34ca994b74134ca66daee9d8", 0xa7}, {&(0x7f0000001240)="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", 0x105}], 0x3, &(0x7f0000000e40)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x94e}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x8000000000007}}, @mark={{0x14, 0x1, 0x24, 0x8000}}], 0x90}}, {{&(0x7f0000000f00)=@hci={0x1f, 0xffffffffffffffff, 0x1}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000f80)="7018bccd9d8fec8c34a460520d0e60d281414c1500c50f6c438ea448a6291b2197e6ab6efa3c006d7c7844e1d769", 0x2e}, {&(0x7f0000000fc0)="ca86af51c5c7ec23dff665191f4054d8c5503ca492cd33a99cbb8b82542c6ee9f87233f546014526df43c0fec7f89d1f9cd8f7c303c40cf94a9975f2c912c411e107f7b82e17a5c0ca395db3e691bf6075e29b979c39fda6854adf7a36f7494d4733d73325b598ef0b78afaeb1932d4ef05d0d94b90a40c23d1b8d8727c2e217648cb187d0118cc9", 0x88}], 0x2}}, {{&(0x7f0000000500)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000840)="6b107e081564ee8f389eb452463a2cce06fb31a911509d55cfe11e4969d46aca461a68b8d08fc1d5bc4a879ad4d57acc266dcaf338fdb01800889c85a6a8a12001174fda12da20e848ee0f4c42b7b48b408bc30ce6d71e2c355d10fd628cf239d146fbb8d7ae65e7a695803a8818119d2fed3864fa120c6de88d5afa7843b9846fc25491c0bf4caeaef7bb3818c2ef65764b1ad579f4748d31b7b2f29fb4fc1f5e85e4755bec5c233522deb8e5270e0309c8", 0xb2}], 0x1, &(0x7f0000000100)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x10001}}], 0x30}}], 0x6, 0x8000001) 08:21:37 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000001b40)="ac896929c1239e5654f3ec9c7e3c6188086d07cc2c6c9309438e4157d9a70820a2eb320451ac27aa37f7f6848c1ec52e1c7df3fc7a5cc6ef2a4404d0c2", 0x3d}, {&(0x7f0000001b80)="2cff96fe423836e64171006478584a7ba9e249f9c06c2c755778d85eac949a94cdfd7d3844c089e5e03d712b386ac079cbcff77581c0b834457d800c993995c6f425443df63327b2cc2ec24fd13300ec82b276054318c4956f1ba96e125fc89362614a8aca94f84107d4d7c15d646206d12fa472042013bf1018988daaef880e0cfcca0405e05cfdf63836d1ed8375c8be3a7091ca736d639c0a0d9d7d851f11117a5cd72319b0d729959b0f68af1817436b7c2c8bc3b3013b3eef59e2d9dd8d1a45cea9e367365b7d689010bb40e0b9d684485e9b0523bbf0cd0c60b5d1", 0xde}, {&(0x7f0000001c80)="37d6df511a9803c124f07478bb8014b639d134823c5154bc2c0726e3dadd5c124a1cc3083ac9794cb012c4387182b17268b1318db61c1beb8eb5ce361cbb0d07e722e7c1f11593347b09891febb6e364593064b45c3f16d32deed713f00781aa1107c95a3ee9b808915c193e9ec301fe7dc012a8d46e039cab", 0x79}, {&(0x7f0000001d40)="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", 0xd40}], 0x4, &(0x7f0000002d80)=[{0x1010, 0x0, 0xfffffffb, "f67997bd6ec1549c322d8fcb0c770e777d859c8328fbab5ce79c14f7efde4f35e41c4ee0d1672ef864be4c4dc26ec2a76ed51e7fe4b22766e6d6b5d4f343efe46d0d5084a41cc38ce3508ba92541dbe5e94780861b73e77a6b7504d8e1ba32b1cd89d1a13e7f91cc8b0d751cf5a51596d99d8a960e3727d22fe8ffd2c59a141d1ba3023733bec6c6af8367a3320af73aee34a27817df4253483d0697460472544337849dfa962d681541bedcb00b3d6b586a1864f3ab39fdf9a2e00f7106136e22b444dbfbfa2237cd551d3528bc01258c9ffa7d5346e3a44f2aaf8042717ed2f7751fb553d1069f08c65f17b22ad36dbc1f214c7d20d097ae047ab813084365b6515e0b370b2a69cab6d4626f7d244cb0f57a65be04a34aa00ed7c725263119186802db26a4ced0692aee684f647582f08d92b4e4d35d71349b845ccbc8023c6ca56365392ec09cb9eb5c5463fae91765bccb92bb00e13a03530e9dd13b93f47efde230a4413a91348e1898ac9bd2d7f5225101365a8db0288f455e5d1db04979ba4ecef8ce7c836a518cc5cec304ddf103c4968e77a4f28992c7ee392568ae204a16d516568c1196f4da779b2d0946670dd12ed94de93bf2c9c69467f278081c3fd0863086ab1da116115b4ccb2b419bf79e455bddf12e09cf6a71e1f97f2f90572c88b23e55a78481e02562a44ae2fa2b38dbdf32bf2d0dbe5ab4ac8cb49713d2e9b85322a4b9cc83b72676b3de46ebea45aa683900a82760a100eb22048c2ec0eeaa57a184c85fdfa93e7424183e2a792fb0d18a0dbad487dd75893d3781e51955da990b6070b6df3617ce25ad639ce0681d153e384b9982614e5c8e4fe090fc7a3a53109c1467931f1b14dfb2117a1b810b2b4f9e212d48860777fbd0b6f4440322696553f16e75dd08cd20c51f1f983a32802034625a1f257f08bea771eb428869b251038742143bec30150a51f5a0d13149fdd0f8869acdbc31cedfd6d039ae0fae6b1a744868e5bb397d8951a5a7d6debd5858db06a0e9d6f661e846e59d2fd10421a3a0b171739d7bd9346d6332cf4467f5919ee58a18272ad5f98e197ec833720d9bd56ecc9a0bbfe9f70d022c36dc638c1f9d5cac93292d892101fa2fc541a48a70cdfd4596cabded47902c283d42f13a45d4f20f5febaff3f710b34a2e8281d8291680339e90a05cabf3a10765d3fb69a30f7430984920128b63b5faeb9f2940a702016ee5d1cb80daffd60b62393ef75b3d223f5b444146f9ca797df7a8aff91f074c1cb0d66ced7dc14486f8e8f5c6d6878df3d1a8d0cf5c32c482fd746041bdee4eb674897af2d50c2eb7d44369938b07db51b10d27c30a894fd7d17573848e04869e337a5703a5d5f9213ae56a3b1c42048ec742d9e9c6030cf375cfac3adcc22c9266b899fa3eda4aa933bd48a8132d33785facc2e38754b77a08e59af4062793c001b354341c609beaada2805b488e9e356001fd37f2144cd2b267630faac0b46d08e0f459cbbdf99975201f95b87a9c68b677c33c1cd7e858b0f08047e2c955d235c290fad6f23cec260eb5410537d4dbe74a1c54f4bec68bbfb8f59f236f932c570efcff58764dfba553d829e8cf63a26ed1f3d00d09bfc4b6b9dac2bfbb1ccb7dd06959842443a82ec832bdb4f38e29913a14a46e63da996192f456368c66c30ba0ce7e33f8122ca013b3998c5771af04d118c9d26609a9f1285405a8f39afa6cc6edd9d585a4d0e3fcc411a5bc4d0da6ab7528ba9919fc44a44abd2c8ab7e19794629e08e59b4725f6efe09d36e252126f76416c2a1cd212e60f4c3056426f658fc2cc357df488ab52e36aec8dc2607c3281340aec9a4afa5b0d9acf91f683f09a7e868898bb22b070c0bcebb0619d44fe41dca0b05a286a7a42c3366aeb0f053251f7a9800ab79d18e511e5c7536dfa60978989ef70041f981b511674046ee6a7341461f6ebfd672345153c7f1c265585971e0053a6133c4ade49f7e615f96c2cbf3a613a32fc07a7f42097b1cb7cb72cc36169386e722bafa15cd334272db93197bf98106a3f6d5cfb9766abbdff0c2cb359e1e9f3feccc9535a9c8dc55680d052f3c8a8716ce22f1fb042cb32f53fad0ce6a44f029b7992f6e319f1d8fee31298f3e9fe2012e43a6b2044ba7e898a6764bfd0cd6898bb8637adcfebed57dc8d614c4e9ae1f1167b7a9b530ba7f47d8c53cc558455c6fd1fd6716e732cf6dad4362609040dd52f649729ddd320bec6c984458a958b31f15daa9c7f1743c855def880b6ea5a8ee6b32255f06ae24bbcc716d94b61fa129d370dec39788855214f94b3ea24da1da79ff464dfb5a96570e4de2729adc89d65cb33efd5f0ed240649de63dbf9ed1b345be097c4934ecc713068dc124993e3ec87eed6e9ec84003e47269953a5249581e1f1a694a7100f77d6858b7e5e9b2af863fb1f06f9d7150d082b0ccf2ee49952a5f33c2aff2f342874a05ffc886d2725bdf2de6b5f97afc5a807900ae8f73164ab50abd7a81b6a38f7b60756c39881a4d991a2adab7d8a2a59e698b7e2fa09ac6e1fc304409bf129f45634b25743d3196a81228eed0513ba6a662851fa5438c3c2307b2ebc80d2a150fcf1c0220152797a21c4b494b5b75229688d2b25dcb127e13e47d3626a5637cc1f65aad3bc6c74f5ff52ac33d947db7e934b5640e9a66480a1f97afcd90488a2839f9f846fd579b53ac4f5d63899ffef6a67bfe5d0790d25881ea0378e312247257e1436215895761e1701b0a353fec327115c1d0030fbd299d49e3d5a7e61d5d1af89c3aa432e9d32081a9916f6b6acebe782695c024e3d78389e23202c9aa5262c60764221e330efea223ff99c60e7af01992f8475cf1add8a9037db4edc890971c8795b23e1050823e0ffd5d59ccfb74e17c10306dda070f74d6baa89b6deb2c781abe1c6d3ffc9bc50ca961cc27be71fdd24c32603381bc4edc1e345c1c6510b785496cecbbaa6496d07ba64e43a43e5f0e034e68ce59a667e331e401fb6e8385a93be97385e8f0d33c0ba46e399186dff8cc4d2e8ef90535e532756d42e4be9cfab07e7c53af2106ca6f2b4d9bec98da3ad599f3910df17981594ff638434f5fc4b16c2d6b8c20736e3ffe4101bc7dc686ec5070bb8cc0f81e3fb601b159c7373562f9e6708bed34d26937bcdf589bcd464e152e3220112bdc3fe86da95d315944b07c2ce812d4e298b472676790902254d92767cc4c7b37e710b6acdc8c4c24a2d1271fcbef0c67614371a9603235d17ed0fdc04d2ac9dcaf00e4dac225b35adb3ebfb69d9bf77f12580b892e2ea82f66644336cc73cf3bc80febf9162dbe4a74b4ce9e3f51787238471a9edc9575cf36f85fb7a1b657ef28872f35c9b429aa88961d9bf1d874812fbbe4899054ea01b549d6a065822944dcfb2e33a3acdcac5435fde3d6a111f416467e1c13b579ce324e4caa9f6b621cded789404d5b089b0a5ffd3195bd494ac4ecce728cb115f1ad8fd3ea31400956aa03a36b0308072af25db3afd0b0b78425a2bd6deaf61f2b45dfd941f090239cf262b1b1e5195284144395b071ee7f6e8f65dfd7545fc92fa65c414e856a0cd85b8bd6a6e9cf71d3847a527ed9bdbc86322c40a2df4da20df4b5d0d4396928f04d19299ef68b2ac21c2313d7a37dac736e0e6c5f99809dd9e0ab53939e2115d9a11511b5db90f4bf9388728635bb25e32b51d5fa7406475132cc01b03c07fa7beffd34e32f73b20d64f936600823e457dc75e0ec313ea5a5cac8f3f792f15d4b3bd8575274cccd04bfc1b706acf14725ee4ec745f225aabef89696217582fffe124a929a81346cff07af2af845040232888515dcf48baa06ae58b8cb8b4c252c7ca8eeb9e10046cf3d870359d3221335624e61ed0c89d80fe74f8c4298e5f69cb69b100052998319ebb44c2cf111a6edfc2da04d9e7de39d59ae3726be7357f0c7df5c181a93af9de11279bcdaa5ed6b1859ccd863678608bfd4fb1e0b9aa5cac5f82e01fca684e770fe9c516026adfb5974c608f792487100214145f7b49988b3467c15acdad9e28a5cc84bb66303be9e138c79466bb34988baf04ec2b0e30cf3e20ea276b02afa2259dbdd9f487f6bbf5196a515554520de52b9738ad1f09358c140b301e48970d48a7f91838a606fa3475175811cfc336902f8737a6c3d0f35da37dd63a0702f63b734c582edf538352ce97f3006f3a3f76756ccae9ce32ac9b7badf812e3632acbbe4aaa3ffcd44e861328f0edb01fc19142778dbfc66f03080721599e9363c45e52352e3aada0ce334b723b5dc67c558285eeb98532e85c5857dfd98a718eded56efcce3f7be1cdd9641d8c930955d2db4fcbb0cd40c977ebbc4cfe07a8288667384dbdeb31edb7d836618f80bd1cab74a408ce193b3906e1b26ab124a165cb4a5e1c324672328ee832dc075760a703edbab4db5b33b6f3a64ca7638c84f47c3eb29ca0c8f4725394484edf028ce1faff33e1536c838bc84e8f09d2040275153e22a5cf137456e91c510ea339fce7a1c382e1db2a9640184c4fd3d0675cc8fbbeb993e3e904f68610bc4abd3ab01b2fb756760cd8d69d5257a0018f2e204689d2dc75ef092e4bf90ba93ec0e26c3f0fb90b377abf14b092d3fb3a75bdbdfc1bdc01ac46a2312553ef7c6644b34982ec2dc06a8e5d398fc5775cf485822db7f648320a3ff9a95b70adb52627942bdb736a6226b0919243ac5cc4032e91fffd2d4310edfed20096ed5e098c159b88a69d7e2b61db1c55fd5668d93b8b28b25bd7f037731ae9871bfce0e68c52905e7700aebdc90468c67eb084aab48641503eb92b88875e3a32e43c8f74d2dddcec0ff2ccf093554a25a0d1d6746818475003f1e4c44ae3bd4c392314af1e82f78b13782a53822118acff8a50ddabdb50d7248c6e483d470c667f225014e33a8c9bf553abc2a6bef21ad434a6fbe4b6bfe95241cc74306b93cf92936cc1f257e3812e2bb56a15230f1264d80e16d95d097a7a88b7b3247020c60ee407ea534c4580f48d4b6439530a722582f66c52a14bb640bd5f7918986eb0bde1930e4ff4f5bc6c2d6bb5fdf30d2b56f6eb5aae380af855a732b40c66ad65e0c9c085b5f0dfb0c08e70ba9eacc541049ef57f622aa9ff4c04f0b45a9b89bc2330a2db149951a507de5ddff0f94dd1e37353bfc016c41f3d4d6fab8b097f49945715a137479096231909f638559f03a9d0f8dc72d9850573772a19ad7e8738dc79073704e9d563fc7895ed93631ff7521bd57f6042245d575dd64785c9934b3be8bd2de4033bf8db12472223997bc359266ef77870be8018330647626eb3646e687df4dae642a1e45274aec89cef1f97e1227693f65959966c4e5b39299765fc80291cb91359f01c3e0a988e4f0661de5b34dbbbbaa80e7cb246df47235700f9353e41298d5166e5f714d686f16f0c031482949e7d153b463f09e1a50622592561a02a1b90a54a080eb3692ecb7b5df8b3c5fafb73addccc9d901d0140deea94f31a5cc416732bec79c55a43b8d518819a8d966197c6099b5011671ee9a3a94191287ae75541a093a7af965c1c9cc3f6f01c18d0c8478dc4662af6f40a5635f107da85f20e622ca2f1a28bf4cad3848f455243c32c9b313becaf08077deb3af4330162d2f1a19c5e061aa04bee8f12fbbf9271b3265379b1069acf815ecb60ffe99a41d4545cce73e423999dad93543644dde50c21374692c817bf9286e92942ac9041f88a826dd2c0c0d07d52d596f04d5dd5f809eb7e7d8a86"}, {0x68, 0x107, 0x10000, "9e612875ec9e3a3e2c359f3122f8e977a4a7b26b44421ac001a06fd574eb81ff4366fca91e04b419863134777a87250b1fd2bfc1d7da4f918a42009e184740f3a2691801ca700bb3036c8b5f6dfd0fccb3e94cf3def3"}, {0x48, 0x104, 0xffffffff, "07060e5b2b15f9a02decd6b2f24d9647c55bbbfc09827c8cb676d208af78071c3521c8a3b94c5ad3e6873daf9b0dae3192a6fc277d87"}, {0xe0, 0x102, 0x0, "9f02554fcfad47f3c2799610dee9cdb1a6aaca38236a1161c9b943bd7793bafcd32420617531f8c60d1b5a59d0459dfdd11824e670cd3e7ce1cfe28533be27b6ab23b17d3c44172bf1841de8d9caa9074699109d107fad7a42d83302c790c4adaae15c5e0facf326e788d3c86ed1686fd85b519fac94b2930b093b8b5cf61c6033e1313957e2c3e5696a45db95b0b457e2479c1a15075b50308de115275ddd585026e0b070e576db59d3f04e7055b0f749eec80cac39abcd89fa4f76b1aafd227acf62be6ca77ca9475aa0"}, {0x50, 0xff, 0xe0, "570767573c55a5fa2f8a8778677a3051b17145b68b45a5ad52220881a4e14ded424b5423c7fa27f6ece9b4fc95089142c882ffa21e6df42101e989a5fe9060d6"}, {0x48, 0x10a, 0x20, "8d2e148629319101d182debdb1f1de7a56527c0b7db81c7d87fbc1e729f29beca975b52082400e6a13c1206e30bd280fec"}, {0x70, 0x84, 0xffff, "f84634fb3be4a13c53f5020d86efa5d5f17298a02d41811d250edcf2b9ca5a7b037204def4edb2ae567085d5351d330b626430493a796092b2e32539ebdc66359e548ef1a1298eb098cb9d95842cf4414b6acec67372f31e63164165948f"}], 0x12a8}}], 0x1, 0x0) 08:21:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) [ 507.414179][T18423] loop1: detected capacity change from 0 to 7 08:21:38 executing program 5: socket$key(0xf, 0x3, 0x2) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001200)={0xffffffffffffffff, 0x9, 0x100000001, 0x6}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000040)=@fragment={0x87, 0x0, 0x5, 0x0, 0x0, 0x0, 0x64}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000000000000000000ffff000095000000000000000600000001591a6721677962198ff70001000000000000c1766c7fd399e7ef6b919ecc600cb670c3a724b27174883708e15c8e6e4293f9680642ba0ea48fe8ab7e64bd3d050200758c3b07b1b30a26881302000000c54fccae010718feffa8100c6c519885901df31370c1ad105bda2e72e008280468a41cf63430c44fbe0000000077b9fe85d561ecd7114e8c6d504dd200000000d0c501c6368e35a2a88406"], &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000d80), 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x4c, 0x4, 0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) sendmmsg$sock(r0, &(0x7f0000001380)=[{{&(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0, 0x40003d}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000700)=[@timestamping={{0x14, 0x1, 0x25, 0x6f3c8b1f}}, @mark={{0x14, 0x1, 0x24, 0x800}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x18001}}], 0x60}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000600)="34cb3bd9241dd8d331f1ef581b56fdb4d4410c125acfbf5de38659d1d0d4d7cf4e32121b1a62272de2e8cf8464e60cda952cd14e5563", 0x36}, {&(0x7f0000000780)="3bf79fb55dd274990e6baaaf779aaa7b1efd521412db71475855cf82f8421dbd06f5555ffbc7e9d796eb55e1f9310b2f255f9d94b8ccf06632ee350c1e17425ed7ad5b646523bfce4c525e500fba6d21083531dc10f2b41f655a9d944f9d6d5a0932d68e439e1cd4758e369642eac9b1b16d5e70b72b01c88960aeddc0775d8f5243e4c76b22fe5e4b6567b9a620d9538839d113eaffaad404778ee124a7e1596d5d8f4eb200f7e975c15b44c2299f", 0xaf}, {&(0x7f0000000440)="b93db7f12cc56791978358ab407d64ff1f5db4f8e7b98e9be43c097436b5d01aa58c038809a4ae963f7a035e506d8473c72d85ce58dcf8739c3c783c928e23ec6e7a4e5d4cd1c9086c3b9da4d509b0e732830b91555d6e82ef16598548d3e4a39699158a57c965438d0b89e2e7bd8caa81171d1c24b49b7389476683b32342f817064961009d56d44a1381c9e0cb58b5", 0x90}], 0x3, &(0x7f0000000940)=[@timestamping={{0x14, 0x1, 0x25, 0x6755}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0xf237}}, @mark={{0x14, 0x1, 0x24, 0x6}}], 0xa8}}, {{&(0x7f0000000a00)=@l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a80)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0xa5d}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x60}}, {{&(0x7f0000000b00)=@nfc={0x27, 0x1, 0x2, 0x2}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000b80)="8045e37ecf036d57326a02af46959a7cda91839722ed3b44d0ef23c25b130b8b28105be6fb42372ac86754e4d3a427c33d4c24e3db277ec44a67402311779c85af50069faa1b5f5f5062eccc5ed40c172aa6d4a4df925baa4e897df56892a832a75be5f9c92086ec244cbf23043f68abe35c14d8ace5c6d715d2f065c1aece5807c367397c14c9ecde18af32b071efac3bafacc89bdd1aa247674dc53b4fdf4ec9a3bd1398ce25dd471371b853c3a1da512256b2935e0c924e548469e938b123664e55ce117c94dcef0f883962c78284b21eaae601333371ffce4ebd1bd4014f6fe504", 0xe3}, {&(0x7f0000000380)="d219c152ce0e9e3178cea20f6a98343a7368693fd4a505dec3bdc1976064da1d1fe12a0bbccf8d3ab922cd49f695ec2d73248233338c10f4725af43820d5da06b5a767cf4d6f28c3ccb1ac0164e420cd562129723c585c62854b6b1ea592406a7630c54150b6e56cbb5eae4f64a62f635917517c28535df65864c26a2338a3fef00fa335420c914dcfb2a7de10b6136fad8a742ef16dba44b96c0a34ca994b74134ca66daee9d8", 0xa7}, {&(0x7f0000001240)="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", 0x105}], 0x3, &(0x7f0000000e40)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x94e}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x8000000000007}}, @mark={{0x14, 0x1, 0x24, 0x8000}}], 0x90}}, {{&(0x7f0000000f00)=@hci={0x1f, 0xffffffffffffffff, 0x1}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000f80)="7018bccd9d8fec8c34a460520d0e60d281414c1500c50f6c438ea448a6291b2197e6ab6efa3c006d7c7844e1d769", 0x2e}, {&(0x7f0000000fc0)="ca86af51c5c7ec23dff665191f4054d8c5503ca492cd33a99cbb8b82542c6ee9f87233f546014526df43c0fec7f89d1f9cd8f7c303c40cf94a9975f2c912c411e107f7b82e17a5c0ca395db3e691bf6075e29b979c39fda6854adf7a36f7494d4733d73325b598ef0b78afaeb1932d4ef05d0d94b90a40c23d1b8d8727c2e217648cb187d0118cc9", 0x88}], 0x2}}, {{&(0x7f0000000500)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000840)="6b107e081564ee8f389eb452463a2cce06fb31a911509d55cfe11e4969d46aca461a68b8d08fc1d5bc4a879ad4d57acc266dcaf338fdb01800889c85a6a8a12001174fda12da20e848ee0f4c42b7b48b408bc30ce6d71e2c355d10fd628cf239d146fbb8d7ae65e7a695803a8818119d2fed3864fa120c6de88d5afa7843b9846fc25491c0bf4caeaef7bb3818c2ef65764b1ad579f4748d31b7b2f29fb4fc1f5e85e4755bec5c233522deb8e5270e0309c8", 0xb2}], 0x1, &(0x7f0000000100)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x10001}}], 0x30}}], 0x6, 0x8000001) 08:21:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:38 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 507.764621][T18445] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 507.792921][T18445] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 507.828590][T18445] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) [ 508.090714][T18457] loop1: detected capacity change from 0 to 7 [ 508.396530][T18470] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x5760, 0x0) write$binfmt_elf64(r1, 0x0, 0xa27) 08:21:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:40 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) 08:21:40 executing program 2: socket$key(0xf, 0x3, 0x2) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001200)={0xffffffffffffffff, 0x9, 0x100000001, 0x6}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000040)=@fragment={0x87, 0x0, 0x5, 0x0, 0x0, 0x0, 0x64}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000000000000000000ffff000095000000000000000600000001591a6721677962198ff70001000000000000c1766c7fd399e7ef6b919ecc600cb670c3a724b27174883708e15c8e6e4293f9680642ba0ea48fe8ab7e64bd3d050200758c3b07b1b30a26881302000000c54fccae010718feffa8100c6c519885901df31370c1ad105bda2e72e008280468a41cf63430c44fbe0000000077b9fe85d561ecd7114e8c6d504dd200000000d0c501c6368e35a2a88406"], &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000d80), 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x4c, 0x4, 0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) sendmmsg$sock(r0, &(0x7f0000001380)=[{{&(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0, 0x40003d}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000700)=[@timestamping={{0x14, 0x1, 0x25, 0x6f3c8b1f}}, @mark={{0x14, 0x1, 0x24, 0x800}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x18001}}], 0x60}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000600)="34cb3bd9241dd8d331f1ef581b56fdb4d4410c125acfbf5de38659d1d0d4d7cf4e32121b1a62272de2e8cf8464e60cda952cd14e5563", 0x36}, {&(0x7f0000000780)="3bf79fb55dd274990e6baaaf779aaa7b1efd521412db71475855cf82f8421dbd06f5555ffbc7e9d796eb55e1f9310b2f255f9d94b8ccf06632ee350c1e17425ed7ad5b646523bfce4c525e500fba6d21083531dc10f2b41f655a9d944f9d6d5a0932d68e439e1cd4758e369642eac9b1b16d5e70b72b01c88960aeddc0775d8f5243e4c76b22fe5e4b6567b9a620d9538839d113eaffaad404778ee124a7e1596d5d8f4eb200f7e975c15b44c2299f", 0xaf}, {&(0x7f0000000440)="b93db7f12cc56791978358ab407d64ff1f5db4f8e7b98e9be43c097436b5d01aa58c038809a4ae963f7a035e506d8473c72d85ce58dcf8739c3c783c928e23ec6e7a4e5d4cd1c9086c3b9da4d509b0e732830b91555d6e82ef16598548d3e4a39699158a57c965438d0b89e2e7bd8caa81171d1c24b49b7389476683b32342f817064961009d56d44a1381c9e0cb58b5", 0x90}], 0x3, &(0x7f0000000940)=[@timestamping={{0x14, 0x1, 0x25, 0x6755}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0xf237}}, @mark={{0x14, 0x1, 0x24, 0x6}}], 0xa8}}, {{&(0x7f0000000a00)=@l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a80)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0xa5d}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x60}}, {{&(0x7f0000000b00)=@nfc={0x27, 0x1, 0x2, 0x2}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000b80)="8045e37ecf036d57326a02af46959a7cda91839722ed3b44d0ef23c25b130b8b28105be6fb42372ac86754e4d3a427c33d4c24e3db277ec44a67402311779c85af50069faa1b5f5f5062eccc5ed40c172aa6d4a4df925baa4e897df56892a832a75be5f9c92086ec244cbf23043f68abe35c14d8ace5c6d715d2f065c1aece5807c367397c14c9ecde18af32b071efac3bafacc89bdd1aa247674dc53b4fdf4ec9a3bd1398ce25dd471371b853c3a1da512256b2935e0c924e548469e938b123664e55ce117c94dcef0f883962c78284b21eaae601333371ffce4ebd1bd4014f6fe504", 0xe3}, {&(0x7f0000000380)="d219c152ce0e9e3178cea20f6a98343a7368693fd4a505dec3bdc1976064da1d1fe12a0bbccf8d3ab922cd49f695ec2d73248233338c10f4725af43820d5da06b5a767cf4d6f28c3ccb1ac0164e420cd562129723c585c62854b6b1ea592406a7630c54150b6e56cbb5eae4f64a62f635917517c28535df65864c26a2338a3fef00fa335420c914dcfb2a7de10b6136fad8a742ef16dba44b96c0a34ca994b74134ca66daee9d8", 0xa7}, {&(0x7f0000001240)="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", 0x105}], 0x3, &(0x7f0000000e40)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x94e}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x8000000000007}}, @mark={{0x14, 0x1, 0x24, 0x8000}}], 0x90}}, {{&(0x7f0000000f00)=@hci={0x1f, 0xffffffffffffffff, 0x1}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000f80)="7018bccd9d8fec8c34a460520d0e60d281414c1500c50f6c438ea448a6291b2197e6ab6efa3c006d7c7844e1d769", 0x2e}, {&(0x7f0000000fc0)="ca86af51c5c7ec23dff665191f4054d8c5503ca492cd33a99cbb8b82542c6ee9f87233f546014526df43c0fec7f89d1f9cd8f7c303c40cf94a9975f2c912c411e107f7b82e17a5c0ca395db3e691bf6075e29b979c39fda6854adf7a36f7494d4733d73325b598ef0b78afaeb1932d4ef05d0d94b90a40c23d1b8d8727c2e217648cb187d0118cc9", 0x88}], 0x2}}, {{&(0x7f0000000500)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000840)="6b107e081564ee8f389eb452463a2cce06fb31a911509d55cfe11e4969d46aca461a68b8d08fc1d5bc4a879ad4d57acc266dcaf338fdb01800889c85a6a8a12001174fda12da20e848ee0f4c42b7b48b408bc30ce6d71e2c355d10fd628cf239d146fbb8d7ae65e7a695803a8818119d2fed3864fa120c6de88d5afa7843b9846fc25491c0bf4caeaef7bb3818c2ef65764b1ad579f4748d31b7b2f29fb4fc1f5e85e4755bec5c233522deb8e5270e0309c8", 0xb2}], 0x1, &(0x7f0000000100)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x10001}}], 0x30}}], 0x6, 0x8000001) 08:21:40 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000002c0)="1c0000001200050f0c000049b23e9b200a00080001c0000000011bb1", 0x1c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x59, &(0x7f0000000940)=[{&(0x7f0000005200)=""/4096, 0x1000}, {&(0x7f0000000980)=""/4100, 0x1004}, {&(0x7f00000019c0)=""/4085, 0xff5}], 0x3}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x7021fcc35f352acf) [ 510.058216][T18488] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 510.082126][T18488] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 510.129236][T18487] validate_nla: 2 callbacks suppressed [ 510.129306][T18487] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 510.171056][T18487] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 510.199643][T18489] loop1: detected capacity change from 0 to 7 08:21:40 executing program 5: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4) 08:21:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 510.250758][T18487] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) 08:21:40 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000180)="c6321422361670e0cbed0142b977096d6272cb7b5c51f77ed3ffe7c5f4a91f9443e4af2f7415a88692fcb175f3c6eef2b3596f6470166f345264d7cc400af53afca54f7f4bba59e91c414bf6597232c73e59adacf301cbe5134b3020bdf8eac8386c556a66cdc80fc6877f4d0d1d1999215471fe333a6760de95a7ffb384fb19cd206ddd2bae67bc65f634d15a94280250a9200f2bc8a0ea01c3f54833f3c9b4caf8c147bcd0dc5a26fcc340e528", 0xae}, {&(0x7f0000000240)="d3ac7a0bd72b9bd6d1a30e441c907643195c16ee3ecf2bd92101968aa978684933d7a86ac5e6e2deee32acca164d6b9ad330e4f6e14664438271e334365c241fa4c837487a613fae8a8acfe7c8dc00092105ba16f3db8a8b76f9c2e1c33dc911a7319894787fef2c35b810749b2bbd4ed4fd24a7820f4fc87e3a5bb0c4280a2116307fbe8e93d49050859d3d31314c56e1bbdf13deb479c7a31e5c1442a416e3", 0xa0}, {&(0x7f0000000300)="633992dacb869557ab3b53c37aac535fc8ca2b003b5be0705834f303a45601fa28b2467ac8f58b1f2dbdcefa89e8be5466d962521a26743c44e7f64f7522e0990f632a4a83426231791b8e0bd22f38f11591ce87a5f738f744bd8e4b22f228f0930972ff2da0af86353608248da76f3759d1fe8800dec4c36ccb8f40a6a2d81d8171ca1ff679d4986e9de660fffdfd8b9a5f2a6055f469db1b51f0550ac3a9e40d25730af2184f1365ed7d8b0227e8c9d7efdde33790bb4074ea52b6eb36f1f293e5c8d472d98ebcd2f63d725506e76a8fb02004579bae6676b0d70c012677afa7ba7e9c402536bbcb9eda3be31cb5c5f3bee2a8", 0xf4}, {&(0x7f0000000400)="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", 0x542}], 0x4}, 0x0) [ 510.668662][T18521] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 08:21:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 510.722830][T18521] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 510.736967][T18525] loop1: detected capacity change from 0 to 7 [ 510.762281][T18521] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x5760, 0x0) write$binfmt_elf64(r1, 0x0, 0xa27) 08:21:43 executing program 5: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 08:21:43 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) 08:21:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:43 executing program 2: socket$key(0xf, 0x3, 0x2) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001200)={0xffffffffffffffff, 0x9, 0x100000001, 0x6}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000040)=@fragment={0x87, 0x0, 0x5, 0x0, 0x0, 0x0, 0x64}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000000000000000000ffff000095000000000000000600000001591a6721677962198ff70001000000000000c1766c7fd399e7ef6b919ecc600cb670c3a724b27174883708e15c8e6e4293f9680642ba0ea48fe8ab7e64bd3d050200758c3b07b1b30a26881302000000c54fccae010718feffa8100c6c519885901df31370c1ad105bda2e72e008280468a41cf63430c44fbe0000000077b9fe85d561ecd7114e8c6d504dd200000000d0c501c6368e35a2a88406"], &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000d80), 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x4c, 0x4, 0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) sendmmsg$sock(r0, &(0x7f0000001380)=[{{&(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0, 0x40003d}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000700)=[@timestamping={{0x14, 0x1, 0x25, 0x6f3c8b1f}}, @mark={{0x14, 0x1, 0x24, 0x800}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x18001}}], 0x60}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000600)="34cb3bd9241dd8d331f1ef581b56fdb4d4410c125acfbf5de38659d1d0d4d7cf4e32121b1a62272de2e8cf8464e60cda952cd14e5563", 0x36}, {&(0x7f0000000780)="3bf79fb55dd274990e6baaaf779aaa7b1efd521412db71475855cf82f8421dbd06f5555ffbc7e9d796eb55e1f9310b2f255f9d94b8ccf06632ee350c1e17425ed7ad5b646523bfce4c525e500fba6d21083531dc10f2b41f655a9d944f9d6d5a0932d68e439e1cd4758e369642eac9b1b16d5e70b72b01c88960aeddc0775d8f5243e4c76b22fe5e4b6567b9a620d9538839d113eaffaad404778ee124a7e1596d5d8f4eb200f7e975c15b44c2299f", 0xaf}, {&(0x7f0000000440)="b93db7f12cc56791978358ab407d64ff1f5db4f8e7b98e9be43c097436b5d01aa58c038809a4ae963f7a035e506d8473c72d85ce58dcf8739c3c783c928e23ec6e7a4e5d4cd1c9086c3b9da4d509b0e732830b91555d6e82ef16598548d3e4a39699158a57c965438d0b89e2e7bd8caa81171d1c24b49b7389476683b32342f817064961009d56d44a1381c9e0cb58b5", 0x90}], 0x3, &(0x7f0000000940)=[@timestamping={{0x14, 0x1, 0x25, 0x6755}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0xf237}}, @mark={{0x14, 0x1, 0x24, 0x6}}], 0xa8}}, {{&(0x7f0000000a00)=@l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a80)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0xa5d}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x60}}, {{&(0x7f0000000b00)=@nfc={0x27, 0x1, 0x2, 0x2}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000b80)="8045e37ecf036d57326a02af46959a7cda91839722ed3b44d0ef23c25b130b8b28105be6fb42372ac86754e4d3a427c33d4c24e3db277ec44a67402311779c85af50069faa1b5f5f5062eccc5ed40c172aa6d4a4df925baa4e897df56892a832a75be5f9c92086ec244cbf23043f68abe35c14d8ace5c6d715d2f065c1aece5807c367397c14c9ecde18af32b071efac3bafacc89bdd1aa247674dc53b4fdf4ec9a3bd1398ce25dd471371b853c3a1da512256b2935e0c924e548469e938b123664e55ce117c94dcef0f883962c78284b21eaae601333371ffce4ebd1bd4014f6fe504", 0xe3}, {&(0x7f0000000380)="d219c152ce0e9e3178cea20f6a98343a7368693fd4a505dec3bdc1976064da1d1fe12a0bbccf8d3ab922cd49f695ec2d73248233338c10f4725af43820d5da06b5a767cf4d6f28c3ccb1ac0164e420cd562129723c585c62854b6b1ea592406a7630c54150b6e56cbb5eae4f64a62f635917517c28535df65864c26a2338a3fef00fa335420c914dcfb2a7de10b6136fad8a742ef16dba44b96c0a34ca994b74134ca66daee9d8", 0xa7}, {&(0x7f0000001240)="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", 0x105}], 0x3, &(0x7f0000000e40)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x94e}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x8000000000007}}, @mark={{0x14, 0x1, 0x24, 0x8000}}], 0x90}}, {{&(0x7f0000000f00)=@hci={0x1f, 0xffffffffffffffff, 0x1}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000f80)="7018bccd9d8fec8c34a460520d0e60d281414c1500c50f6c438ea448a6291b2197e6ab6efa3c006d7c7844e1d769", 0x2e}, {&(0x7f0000000fc0)="ca86af51c5c7ec23dff665191f4054d8c5503ca492cd33a99cbb8b82542c6ee9f87233f546014526df43c0fec7f89d1f9cd8f7c303c40cf94a9975f2c912c411e107f7b82e17a5c0ca395db3e691bf6075e29b979c39fda6854adf7a36f7494d4733d73325b598ef0b78afaeb1932d4ef05d0d94b90a40c23d1b8d8727c2e217648cb187d0118cc9", 0x88}], 0x2}}, {{&(0x7f0000000500)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000840)="6b107e081564ee8f389eb452463a2cce06fb31a911509d55cfe11e4969d46aca461a68b8d08fc1d5bc4a879ad4d57acc266dcaf338fdb01800889c85a6a8a12001174fda12da20e848ee0f4c42b7b48b408bc30ce6d71e2c355d10fd628cf239d146fbb8d7ae65e7a695803a8818119d2fed3864fa120c6de88d5afa7843b9846fc25491c0bf4caeaef7bb3818c2ef65764b1ad579f4748d31b7b2f29fb4fc1f5e85e4755bec5c233522deb8e5270e0309c8", 0xb2}], 0x1, &(0x7f0000000100)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x10001}}], 0x30}}], 0x6, 0x8000001) [ 513.145985][T18552] loop1: detected capacity change from 0 to 7 [ 513.157934][T18555] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 08:21:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 513.211449][T18555] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 513.247983][T18555] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) 08:21:43 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:43 executing program 5: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 513.566926][T18581] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 513.619064][T18581] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 513.651835][T18581] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 513.734856][T18589] loop1: detected capacity change from 0 to 7 08:21:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x5760, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 08:21:46 executing program 5: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 08:21:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) 08:21:46 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x35, 0x38, 0x66, 0x0, 0x61], 0x2d, [0x38, 0x66, 0x32, 0x61], 0x2d, [0x66, 0x62, 0x61, 0x66], 0x2d, [0x30, 0x62, 0x34, 0x64], 0x2d, [0x5a, 0x64, 0x63, 0x37, 0x0, 0x32, 0x62, 0x65]}}}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 08:21:46 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"/756], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000040)=r2, 0x4) 08:21:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=@newtaction={0xe70, 0x30, 0x1, 0x0, 0x0, {}, [{0xe5c, 0x1, [@m_pedit={0xe58, 0x1, 0x0, 0x0, {{0xa}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x20}}}, @TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe70}}, 0x0) 08:21:46 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @dev}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000f00)=ANY=[@ANYBLOB="180000004000040000000000000000009500000000000000d387777ab82499fd7a38de0cd87509fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ff05000000000000007cc013f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e059db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd563c5f205d0d44bfabd7013f8192a3029ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc925aa3106e4821a62a5c356d074eeb638904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f7dab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4b2172581541f9a97dac30fec3db85868f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f98356e321bb3ef7bfd1c957c1fe85603ff909878b9db38af432516700efc72e6847e1e86967d2a12a357a69a6cd73b73cfff08965818b338ef1241a331bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99f9afc7b31c85c56943960200000028ac09c44b8a4430c7b1ede6dcbb336abf6dfb3fc9dbd0ef24b01da4e278114cb81a928731930bad795c1b39e0ab09c047bc9ce9f0fe32da6abad0e2bf7e5a30722392b7666b5831d69158f1773201f6fc7bb52e9f0da712f2af42a11ffd44f481a546ce0774fc7369dc7e7583de2f22d3e1ade747bab0c4af9b4ba8c53e113a99a323ed6c0bb71944acc239f9616759ffb423670051ca340e2a81870331ea01c57609758b9bcea0778b23561bdfb204e05844c00f2577581d03a1951500000e1673ceaec0c5000001008d2fdade00944faa6f7808983e683221b9e447cb08fd9c5885d06833b094f91a8ea02318318cc6b8d6ad3728bb259bab77a8d2d3ff8779d34ac10c010100009c050467ced134bafebcdd91664bf11ffd667fd7d0686e5e3a50e8d6b330a273444c3b82b79c73e3a9392814f525429e067ac0248000000000000000992354bf8096355c27bef22a91deeb17107895beff0f3728c42ee0581562fc7ed0a230645b1f5af6373cc8ac3a865934adf6d6f9a4e01c6d659ba585a60790802e979f47c1ccbf8524fa10398ef91eb54a3e3e3ef13a0753bf5d05081157466f48d7758882e903cdf5d79284b5cfe7e9a3e93ece7c8e64719067ada30aec0f767d91c0678d9be28d0e6c20a25dca96d3af2942d34b93a69fcebcbb01df095803002f1fca52eb513b1308cfa0f747ce8c928e038f035a79672514570b832c2494e370b56fc1e13e901cfe7844b1b20000fe386f880c450ed587cc6a81e18ac79cafa85aed3877cc6258c7565ef49e5e419657937f0bb53933f4d173198ba972f73700000000712e39fbfe4e013562095dad3ccc7e8faceefe878ea00652c0f488a0fb55e9f922e2a85acb65e3ff2c363725f3cb901425a1128999180187f869ca5db4748a3497c8b60000000000e156f44a8f097c6fe39959da79f3d4a78f917c5c0303d0e398c3230d6eba87be68181fed1266381a2c7689c3c60702863fe71c60a519f6aea54f4d6023a9b1d95d0ed14ea286e2013ef87924ee1a851298f104f3b26f49f62f73dc1420de064b12295bcdf2c418688c8edc5d6a92c40ba9ea60e47bd64ab3dddfe3cb24c4de1d0dd802ed1f3312412522a0303bc011b55d170cb02354c1f8eecea32a852a9d4d1a537a375ed55e5c1dc9fe330000000000000000002300000000ee0ef62e6dd80951e802f9bd94d83c47f47fbb84d797e400000000000000fa86e0fdd9b88c4f834736db1c79cfd15d6efd3a9713e68596cbe6205523a6182075b91a1d1c0e507edf7bf8d2f6c5e70294d0b5bdbcc8f6220d58d19851f0555c2d349706e3fa28a85a1d07306b5853d6f409c2620680a46520a9f88adc1639345f98496a900ffa59a4cb69338d0718d1e2f2daed05f7a932953d7bd40af294f3d3502dde62ddf695c4cbf4fced0b23e782488932a3ba158fe65bc88977cdf13c46beb4be20a74faddc5459d173f9b073e485ade415b66314066d43275459279d655128710a00da519c4b53937d30856c2b423f2d9d8e5e2d0cbcdd29eb9cd44cbe5b64edaf1b107ecd1caad3abb1cc5ec6374ce9bfc991e68b21c15ba401b51e3eb49d76f77287512d988cd9cde7ef42bc3774385e8a9c993cfbaea922ef3381fc6060586f37469de8ea44821b2880"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 516.312905][T18623] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 516.344509][T18621] loop1: detected capacity change from 0 to 7 [ 516.354525][T18623] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 08:21:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 516.389828][T18623] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) 08:21:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x5760, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 08:21:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r1 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x4, &(0x7f0000000440)=""/18, 0x12}, 0x0) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x4c) 08:21:47 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 08:21:47 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe0a, 0x0, &(0x7f0000000540)="8d14fb003092bd81ed4e5b534c5747c8", 0x0, 0x1000}, 0x28) close(0xffffffffffffffff) 08:21:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000020000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="440f01d1b805000000b9080000000f01c1ae410f0f0bbff344af470f2045470f01df2e450f0012f20f01df450f780500100000", 0x33}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 516.819751][T18655] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 516.846350][T18655] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 08:21:47 executing program 5: syz_open_dev$evdev(0x0, 0xffffffff, 0x0) syz_usb_connect(0x0, 0x3f, &(0x7f0000000100)=ANY=[@ANYBLOB="1201000092908108ac051582588f0000000109022d00010000000009040000030b3db70009058d1fffb000000009050502000000000009058b1ea6"], 0x0) syz_usb_connect(0x0, 0x2d, &(0x7f00000000c0)=ANY=[], 0x0) [ 516.883480][T18655] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x5760, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 08:21:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) [ 517.014009][T18663] loop1: detected capacity change from 0 to 7 08:21:47 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 08:21:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000640)={0x28, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 08:21:47 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 517.320037][T18684] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 517.358067][T18684] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 517.404053][T18684] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0524fc601000024031000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x73) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000009c0)=@phonet, 0x80, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/236, 0xec}, {&(0x7f0000000d00)=""/175, 0xaf}], 0x6, &(0x7f0000000e40)=""/93, 0x5d}, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1d, 0x7ffc, 0x9, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000280), 0x5, r1}, 0x38) 08:21:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0xc018aec0, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x8001}) 08:21:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xfc66}) [ 517.533224][T16876] usb 6-1: new high-speed USB device number 5 using dummy_hcd 08:21:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x5760, 0x0) write$binfmt_elf64(r1, 0x0, 0xa27) write$binfmt_elf64(r0, 0x0, 0x0) [ 517.609840][T18703] loop1: detected capacity change from 0 to 7 [ 517.783550][T16876] usb 6-1: Using ep0 maxpacket: 8 08:21:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x5760, 0x0) write$binfmt_elf64(r1, 0x0, 0xa27) write$binfmt_elf64(r0, 0x0, 0x0) 08:21:48 executing program 1: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0xc000200) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80) syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x5, 0x5, &(0x7f0000000bc0)=[{0x0}, {&(0x7f0000000dc0)="200be12beef900f93620b909525636b61c86a0d1445c8e6d9da66a0b2d956285cafcd47d6963c45409024ac3d38f100025d69fa587f8b073843705876cf6c9bedcc29d9bc0ee473916981037da1984700ec4cff88639a0e5fc6d279fa9b2e4e3a58af464e3f8f225ee0a8385d4af7bf0b1c2b1e1588267675fe15607adcee0cc46c5a5c721790cfa7bda068add867e0d0c2179d8774ec951854c051c1e85dfc15aac9267503af53baa8f58af8b8dcac9c1fc21f254d6420a63e77a9a52128851b1113dbd391771e23cd5d7cc", 0xcc, 0x418}, {0x0, 0x0, 0x55}, {&(0x7f00000009c0)="cdcdc0ec68cbade8092586cee8390fef00bd4fdf0a02af95d4237f66f43a5ee38f512186ed8e92afee79c01fd80733abc42898acf5dda5b4a3afe3fb54ebf9dd5b5d64", 0x43, 0x8}, {&(0x7f0000000380), 0x0, 0x755}], 0x1040, &(0x7f0000000ec0)={[{@flock_strict}, {@source={'source', 0x3d, '*u}*@)'}}, {@flock_openafs}, {@flock_write}], [{@obj_type}, {@dont_hash}, {@uid_gt}, {@subj_type={'subj_type', 0x3d, '\'@'}}, {@smackfstransmute}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='fsi_master_acf_cmd_same_addr\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 517.832513][T18717] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 517.894400][T18717] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 517.903477][T16876] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 517.915467][T18717] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.0'. [ 517.936697][T16876] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 517.984216][T16876] usb 6-1: config 0 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 518.020503][T16876] usb 6-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 166 [ 518.056774][T16876] usb 6-1: New USB device found, idVendor=05ac, idProduct=8215, bcdDevice=8f.58 [ 518.089937][T16876] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 518.111521][T18738] loop1: detected capacity change from 0 to 7 [ 518.127593][T16876] usb 6-1: config 0 descriptor?? [ 518.162918][T18683] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 518.403289][T18683] UDC core: couldn't find an available UDC or it's busy: -16 [ 518.410738][T18683] misc raw-gadget: fail, usb_gadget_probe_driver returned -16