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"}, {0xf0, 0x84, 0x1, "0093328ad8e47c9beed51ea921cf833d694c561add2b723ee20539c9527b04b362bcbdfaccee24ecff85d0e564b97cad98787feb99390b22953eaaf7b75aad32c56ae260181c4fa2d98c3c345018a65bf30a16cf88859b0b2fd36e2b46b94e741d9358905b1c1a9ed6c223c68f18705350c032ab58cd238c0305b4335e9c8905bd612bee9a1cc4b5ff6b1101c6eb8d6be387f1b4de873819516cfe5a945d2c06ba2f669e700e46f103fcdbc1faed680a6cb5c5cf92e43d1a9f9f0ae90855fc7340369ea5da03e8ed85417180d14721e34421191897ac3dca97bd4cac"}, {0x1010, 0x119, 0x1, "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"}, {0x88, 0x109, 0x1, "acb1a8d25173d9a43fefd924cccd0cb92254c137d3ea03d7d66003e331cc4093bd39a4395391034c5d0bc2a2239dac37c7de93457ec2ac6d4c2c2d14dd5b8e5ee9757db681834822464d591fdaec45e9acc337bb55517ea86feeb0572cb26582313c4f7c27c31ca29ee5a6a79c952682e330"}, {0x1010, 0x118, 0x1ff, "44f28bd096c3a91797115d99fbcef222a5b4f84416437fa07f94f72e975787a2b2a0141b2e57d19fdfdfdc55103ed47b0df42d387bb23f0c7a02ed03bbfdd47582d977eb57100980daaf97a754a9e98fde61556ebfafb9152b10e22da8791052f9c6e331a72db933405b2243b236e319bbd9c4dc5d2aada0b12ff5c87beede0ceffb3702f6d6193d0e314f64e86dabcce115c772c939b041c69a0c7c86ee03c34c7f85e2ae3cf9eb12f8a1b79f7f8b8c2788231cdbc7219674032306d58dcd51caf6c2a19f6977e49fffaedc03f87189767e9ffa6f73d79d73c44b3f714dee3c215d3c92155d1328262bf9273327f2fc16b4ade8dc5459774f03dde64eb75fedfb9818978a308e77e80d7225316ce6308a5d28c440ab26e3efe40c556357d962ea6bd38deee47083c49d43de7e31bf9a9f6abcfcdbe424b4adfef9f2197c654dfa2d40eb515ff21fae0b71c268737410e092a2b8ea0a30f3f18914d697ea87ed788e650d79bbd1af34d4b5f27df1efd0e3bea251aea6e0715cae36c4a9e3ad4f0257c5c7da006f3146dd171fd7129d5334e0032d9d705ff334ad32723e2f7c86984e61da3ba64f2e11b962cf9f4d40ed9da12bcaae033422ab48b315fdcc8ae11d52fcd040b351893e23240e060b98724df034245215700a4042966fd4bc1dc1fb232f48cdc0e7b042b2b425633e1afaf644b1fec9e84817fffd8bfc0a64f3338fd3ed512230e65dc4ac0ea08971540b25c376abdd09f33ae535399f390fc7758e73d3a67ac22f6f05363266743e431e4c962e0a494435ef2b338bf335abe4241cd0a60b7803a840564be49f99b5118ccfde5e396f73bff52ef72d509bccbab8026c63387b9322c7054e230fa58a0c2da270d27b51f85c50432c034c4a0594a270f8d9d0a97f45c051380346027e5fbb44308f407a1a0ce93433e0d21dab881f2cabcc5b3da6f03aa3cb54861b27bf5ae8edbd2189f4bb7b3ff3e70a48afa03ab481d3d2f76737757ecd8c654ce0e645bbe12e59fbed5302b933eba0fde418876e84f22afb6c537f3c90a67fdd8089fed6c395f9827e02ad4b4e2f3a14660267797c27603ac2d35b0fa1b42b7c96f11abbb2f0c91843c75a60e8b2e32d56c31e02e764151554ed923a94113c97ab983ef32e6e42195260a2345175a4b3637b657b892843685c6d5b1a255bbe1a27a7fad9cab98360d27bf74434323257f8a30d24e775e86afdeba802a01c5ebc82fc44162b30a3e4a27611ac12a487677eedf79976fec160c17c20ed860a817e099f330d2df5b5b5cd34f2bf4a2a1dc368cb59e8841ce1a06c3abbf5a5f6494691bb68b2ce64b6666d9ae2c4b8a1ec70a31537e94dfb37dc5ba3f050f5e665fc388083f956d28178d7d99324b4923649f930e89d80a909596a1f9ae0d153c2b29a384c6872b28f9b5a60872d6e02e5af5906214c389dd09fd1ad1467ad1dce8855549f08a546d5646fe47fa4c2b7b2f806780e6db883307c69cd067d84f7b9efc6c9100f360bb72b865f2ed4d103e6f9b46d946123763c030103a255e877d9e2cd5e71aa2d87f22cb1736c58a62266230e5a36cdc61bdbb4462f40a452d4bba3ac04c9d09b9352f25d38d0dd3c40566d84f88bb7e9d1ab6613117c47de7819c5aa9d398ec780470595b1a753797a3f2c622ebc04b4396eb85e0e8b3ea3eac4d3d4f49a3846bd8b55606168b222f69216004abdd41607df498835a031e7c846767dd1b8a8bbc94c3038abe71c5341306a90dbf17cd2277b01bd972acb28fb94b4a8b574192cc12324665453cec0a4716d3aba65f835cdef368c94035381f51e0d6eb4ee0f0a5927c55b4ded084eb8667e288f0821dc773d3d9be5624d31280392de4b33f09b117e1ed06c87396924f49d074e3794016006247e069bbe7b50e16683b34357f71cf9bb05af4ef184238b40e535d8eed18dc1b4ff0c830e0dd29efc152916e9bd90331f7ba190285636021267cb06b035b1a9a7dfef7265ef78d70106c2ebba262bebfdc6b645cebd822b7c401019c2b70be9a472f1cccdaf389467d45c0786bd379941345552bf70d641bc77e11982ad2f288940086409ce81b214124460e904baeb81c09ae1b2d66e2fc563746a2ea77c290eac59996d27d4bf390ac3e81e7188dd4936b05775f646befc7f029ef9350e618f5e2249f9c40aea0229a36d345ceb345dd16f58bbf56d66c122a69d3c0a413583694c9de2eeb3b49efeac885ff35def15162e0a17df6772fdc2c7e8b49aa56be93d6a4c588d2bd78fd554b7a94691fc618406330ac161ff3a6ca4007bf5c7bcca681916fc0f53abe094853e7d34a7f231997fb046c5bfcaa5742397ce6cee0d9ded811e141f0f25c9db77da3cbceddc2f070ec44368d5728c6e9a240f31632eec00680b2e459665f9dab2ba464aa9379a18df4972ef155ba3c20a2acea199ece07174f9a5942c7aedc140b2b416002185c111e6a04925ef360c9efc4abaaf20ff933ce2c02aef34da639d0232afef81bec053ad13e766012168c6c89c57e0413b58c1eefa5fba1993f11a3ae4b7c164c2f1c7d46cef5620ea4ce777833b3b35bd9271a140843be4e392da4f580557716e2e5069f0231f1e447aef285b876f5fadad41fa3212741b1ab236e01575bdc9d23d91380dfcfe9912493a4cec7736c788f68759b5ffe06e6eef5bb30ad41d8d1817552265b475d1d3709da61af472e48d16fccce26fc952a9f0a81432e0eb0ddd0975bb873913ad2d17130cdb9dc3115a35a2cd4093493bf540b2f21b2b2a1e349b4f599051d0d64a2eb2a08cd40b5e37a69cee57458e1271cdd9f4e85ed5b86781019c50db963ee1b9c8f0e865bfa801753476d5192026f5f9f8582276a6ade6b6d90b9f43566b74ea7c5fb93d9893f4af8c205c4b7cced57e6f4d85d4f0217591aa815fd1a17790750a9ce814df4ba4ca56d1a3eda16b332eadd07c3d27bdf557742477afb3014758fd09f6d52e661dc8c8bd90c5e3592808620d9ae465b9955e04b7f078d0719b1d51301624d74d28f4878afc17e600c2b5b76ea8d7ab9498f74e434e2365a290148c97be4b0aa0f664b53710196814d07ff9fd9978e488fbbc2013ac49e1c61470d95caed84bd44b4756cd48b311a38281cfbc536c9924956068ad8fa19384a89a402ee7e3e8f5874eb24b68e4fcb16bcf6d30d533c63df8b757e2b4171033869564a760d76c73a6e99f16bc60015f1a599305add641eeaf0f3977dfab8cad95901d078986a592ad4fc1075036a84f4627a5c3a9627532acd4f9ff1071a72090e0a83def1fc0d092e98b4f158b4b8f38d027bfb2e935640cb6b0f61ac9dcd878d12af88a2c5e2750323a344f66e38e64e45a2fb8e556ed267175dba5f7c705c1efd0ff657a25a011574dff16aa926362b55835e7d8889a3ff0c9f37a5338d04da92d3aaae40d68270a998fc78a0749346b63e59c15bd79cf46cea65b3037ad8ebfa8548509d892353db753252065fc794b51efd26ca11d12dc7f63ca474c23ecbdcebb348934221b1db91eac6f100173044e4a020470010cdc7018ffdeb5d0210976872448185453f48339517d69b9242fa997874ce4497c1ba42750d00d2e772d656ea270e79c2452dd7a0b29e681ed47823833b4a5da2efda95259210cf37ef9c83298b5c1add948c251449e8418ed69d4919cc5d828519386dc2bacc92d4801c11025719236d9402c86103befd2d2712a4d6e30d945dd293dd977a5d25878e144146d50794b9db292d22722c59d84303d56d3559c9b32bcd8acd0b82122d86d51414ac6232d6495c16de11cbe6bfffb79aa78d2a102c09b2f103e7b8b4fa132745abbcb7cdb4198045e6c3f8960b6f0cd4339eac26ef03af4a7ccf692001acb7b6813aab9c9119a677c7bb1470fd9a42c7793e01ecd1a6a6108411211a015009b0c960da56665c214813168f2864f1a070f0009d014117408308333447e2afd8b586fd3202f90d3e9edda617390b047eab8db3c957dfd8dff6c1c9ead8f1b2e75691b1ca92c28e148113655d278c3ec299d655ff2b964302b766955d20aad5111356808387e11f1a9433c2c0ce486db066fe66760414613b80c319ce88562ef78b3d313c387949f318e1020f5187f1ea4ee77e382251f97b2a343ce42567e2c6e2c7594262e85be0bee371c475af3002d042a7f2b30e3158cdb36bef4373c29f304d7d6f9f234fad07e762109f034fc612d3f11b8a24cb774aa5633444a4f87ef32be5e8bd3c53d3a0b525e5af5b5720063409b44f9b9da8ee1cfb38295b907ded75ba04845d7b3f92892485c460c79e63822538774ad346870b169168046f86f8c19d89b0651c8c82e51e82fbeca7bec5ec410f0330b1036b3342785604e7f031f420f5eb09ab7abacdc2c9f21936a78786e8b1db60999f948efec25f48139744ee67eb346ade86a7df4d20ef63956e999814c52b599b619fa134a5b8412eb4aa9e0cd038494248dc335181dd6cde428ac6879edf2843df28ab01d14741147503da438905b6ee2e9f741c8e72fc052be0af24dbc78c20b9a379b01498f5cb5115275bcb60571109b9c172690c7a866766135b01cd71c72d44724487982d17810cf7db95d5655df899bcc1cd1c87a8dddc3885af9bd8f9ee90bc37480336206b34b2a64c8a98e7b486ffd8e1e819033b157a9fda309e006c337a41e97fd7881d3a1049e2fc90cb192d4af3ac9cd71133ba876db468b4146709424e3e8498946e400087eda02cd728db2657c365f047bf696ff60dc791afbbfecbeedccb5222f760f8613f283781d1b2ab0e272750f88497457b792c5bbb618edb0395139f4c5af586ca27be28883a3f35b86db0ccbfda425e5754a01119390a962e3a73904424d43c911a516d3cd4f28e08295d8603be5b69c97f1f58c9958524c14d29481d18826132accce696c4fd763a7e5cf6b6224f7b9d6fefd182a1ccd3800abf2b7211a4a75f938b0764d01e4681961f9a1766787b200df7ded0782cd6a0e724ff5e8ba5357af897e7c9b8d21270acf7434900bdeca5595abbf1a577e2df2c65baa8437882ea3f0d803b0853a59ae0eccfadaae13b3bd417b80805be908f38519546046fa0701af0cc97b51c3f27fd89dbc8aa9259b4d7794dd5b545c65e711ef66e353523747a6b42c142451351a34d92f086899630e87a0b7e18dcc93c762b86e7f15624cf3bde48d83e46ad5e0f81bb4e12373695dd687f3bf37d71be1e72a8bce1ce6354426e5b8bd3f6cd602043ba37dbbbccfe6c7aeb0cc153f1506771712d589cb3450de9fdef7164d255a0a0ceb6b6a0a7265df668482666222bf2bf7bbb50b04c5bd5a9221a6ed51e556d678d6dfce82c363ebbdee68d8b1017d8e7341f1b40bbf435c4d5fd6fec495513e32a2b3f3aca114274b8a16d22822719a2b2945e3809b815a06bb5ab76ea4bdb96ec221e66d394a7a0c4ad7f8a983d331e0450aa92ccc1013965b0a1c2805dabcffa63224cf5401bf3eaab386143773b23ba470d5d38963f6060f25cb51eb8469a222173afc50db5187bbf04cc96fcd18ad5a02a96c3892d794524ab53d075d94d3ccaa278b3e937fff2afd18094dbe2a816299e12cf2435fa3fa80719c535140eba682641b4712bd41e077a9fe5aa2b7266b1a8c42cfc26a40cccbf7c621887c869f5b49e183c7159955f7e4c7877693ffd29ac3d7acee4868e92776c2e9fecbf6f55fdbf17a10be6c26b15050348d90dbbb24239794687abf8a3d91b8339655efae26a850a2b138e9e7b8294ad868e6c0042bd907"}], 0x3208}}, {{&(0x7f0000008680)=@un=@abs={0x2, 0x0, 0x4e22}, 0x80, &(0x7f00000089c0), 0x4, &(0x7f0000008a00)=[{0x60, 0x1, 0xffff, "06c3e57b3b012fbf5e7296642a09adc3054745b74544c3dfff366b6690810062a095c82c5f0a8b20395dceebc99cbb526140ccd4d5b90d00a13f9c6a48d026c0996f41b9258a8ac8adc6917cebde"}], 0x60}}, {{0x0, 0x0, &(0x7f0000008b00)=[{&(0x7f0000008a80)="45f18f0803d50a", 0x7}, {&(0x7f0000008ac0)="bd3f8e0ff22270253702", 0xa}], 0x2, &(0x7f0000008b40)=[{0x68, 0x88, 0x8, "82c33d7b1b7b65b2f145de8d1c85f63817b706a2a9c26e099048b97091c197640a78fb8c66734faf649f58a493a8dc039c053e2748fddc53ef54dfaa4f8d5c4a90601e2d8c509a6ad94a002051d92cff5d7c5bb36ba639"}], 0x68}}, {{&(0x7f0000008bc0)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_bond\x00'}}, 0x80, &(0x7f0000008d40)=[{&(0x7f0000008c40)="71feeb543ec043022dec89e9174be7a790815b9005518ac9650601bbdbb4e2c9d06a32784edce18ea48c8cbc3669234f79e49cde363c873826b2b12936deadb3c0ee152362f514e3a4a976f9e43238d92fb6b87c26e403328d1b171398bce25abe0836d610efdfe9200cdb2f32f06162ca2ec18a4993bed23e45f16eb9d9a9f05eaf431cdb684aef5733f2cc7694d72df814797eb965437fce41f626fb6d231df9400c4c648560", 0xa7}, {&(0x7f0000008d00)="8c23adde9be10069b207f0e13330cd", 0xf}], 0x2, &(0x7f0000008d80)=[{0x1010, 0x10f, 0x20, "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"}, {0xb8, 0x10d, 0xc1, "114cb8e4a7d4e44f9ecb60b458fa0a6548b8be603a602618baf30f0bca32928fd94e480a1c70a2d964c16806b3bd31fd5e9ba3655b6515e4602226eb0a3e8d21880c04df2b1b8226fb5f6b2a33bca08d9ca7fe8a4e5355e343af2bba9ba3dc9794adbc081f99ae07783eebb7287e93fc97421faf46ca061925991c0d566407fbbc8e7c2d3989dbdae4eb4f1e46a8f0af8c16b874b2efde4a2648ed96c57e9f755c07"}, {0xb0, 0xff, 0x4, "151813ba6e24de5df9c8482d653c2aad42bfc8d02cf8f50058696d91dc667641633eee3267db08e5a4bcf69345c4641364f013e01ae40bc1ece087ea546a2d4ad5bb42b7a47868a8964feaec35ae0c838e338fd84b81e93524c1acae0bbe3786d30347d67f5e972706e7c5548a84e96e6839cb9dda613ce7e2e4900a5793b84f92a378c6a18ab33b84a28590eec959f86ea38796016b3fa29d"}, {0x1010, 0x111, 0x10001, "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"}, {0x90, 0x103, 0x3, "acac3584145aeda05838d4a9393435ed8d7e3f812f5136d1bbdd91b5f98e48635f13559677816633d9892354317d560707dd1ff2e42d6d103657cd20377f5e5fc44f9ead7d141794f991a3fda2cda61a2f6669b71b6aa3a3a1b6883c2ffe6cc78c4af5b806b055795a2d44c94a5fe20c3200e70292adada1929520"}, {0x40, 0x88, 0x0, "2165330fbb48b2a742346b912d48bfdb5fda0cda5347b9f808626a3d9a9d1a5a0596eacdb197e57131d4915de5"}, {0xd0, 0x103, 0x9, "508eed63aeec9e8e496dc172da011099140ceca9e079f38fe2113c61d5f4fdf2578d1f1941a1c79126e75b0d0fe1a9051d0b7a775529b568d15fd497872321b15de515b3a8fcd4465249224ac17ac10bad8aa245919f0c07a6d6c8b2c2094bc82d124718b05c2100735472d58d9be4c34a4fa84e7620aa63931661ca507a0929c51609296b7a006f6acfbecf3bcb86483f54b9abf55e296a660a5442cd5427dcba452d0594adea4d3230c33c6331590cfae6720722e620657e119d8dea41"}, {0x88, 0x84, 0x0, "c8d344bfcc8604c1f3e58e2f5732cfb446fe43a1a7be3c3fd375c9f6f27ef6ffaf4cc30dca00bb1f45d575f9a53f0fbf2faa32fbfbbbf8bf3a8be32bc78cc364c09ec92b08052b1633c7061aa8529829eafcf9a482f791b5c147e0991e2dcffd8b673a42b59d7917e9995a979b574dfc7a363ad3cbbf"}, {0xe0, 0x0, 0x0, "f441ffcaf23ad98c875386736a270b46b0ea7e1e275976af4dacdc93d3cb9f5bbba60eb62b384d684c55522fd75d76d03b8590b7912b40a053e78dd7fc64a39636dca024ab9bb608b9ccf4acda89c85ae4312b7db0d91b6ba1cf65582ae23dc454abac7ba2fe6011ef33ba83d42f1a9f68027f1af5e6529b4249d11a787d98e6e54576160e95e1f5e49148b214b548a335e47a1799a63b415145527ef6e04cc95d933c334abcde0d7a90f85c5c36116952ef64c3523ceb1db19c02439af7166f85238d283f85421e1c98"}], 0x2490}}, {{&(0x7f000000b240)=@ethernet={0x6}, 0x80, &(0x7f000000c440)=[{&(0x7f000000b2c0)="5882e8899becc64b4f2f085fcbaa39f8f6b272c766ecaa5d65741496fc5771204c0497313871a8011021088463a47a962e89d5831493ba9bf463335f57b08a6879eb017211f971790822c47f2ec16e829bf78c568762aeb1971d7c03b31d90da886597f4f769845e2c4894726096494b1bca3db68c6436036bce63c4455df89b1e6c74f18021db127d2ef2a53ebb86a60de76105643288138d076eb6c66a2c735808e416a5d4a2", 0xa7}, {&(0x7f000000b380)="8f1afeb831a24491c0f2c5db11ae48b095f020375bf7ff0dfdc3b3831f18610420469de2e58ffafd3bb1a76047571da061915a2776243a7f25a547a96942", 0x3e}, {&(0x7f000000b3c0)="951c5f36d18fb8bfe9640076270c120dced8b713cc5ef28cd990255729562d0ce2c4eaafe03687da1a595033c58ef0d6c79c0a7dafc1eca5f1be659bf620733e14521c9c479645a9d740f8a152330b1cc47d22", 0x53}, {&(0x7f000000b440)="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", 0x1000}], 0x0, &(0x7f000000c480)=[{0x80, 0x114, 0x9, "b4e090e54fe64b19603e2d3415a202c374ef4f74fb624025aade4865f465e50a4b8c4b32ad29121ac0bb335651da8eeaab2b40ea264d57f5c94e144f57dca9c8ef2e547e83a82acef835403590bbca4242c1aa71d8adaf96a227ed58e33ff631001f5a15d9b8118eb26900630db2a7"}, {0x70, 0x30, 0x401, "10428f4f5773b9c624fc49c1f7b7b7e8212d23f1f19b2d5c74e9535992fb631160a151eeaeff4d153eb9d293537cf6744e84da70e9f59d061af0c5444337cff059fad3c5107149c22a8cf7a24b6df994d20ecc190d36ee6fd9409d"}], 0xf0}}], 0x7, 0x8804) 11:02:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000032) 11:02:59 executing program 3: r0 = syz_io_uring_setup(0x77d3, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x67}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000340)=0x0, &(0x7f00000004c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index, 0x0, 0x5}, 0x1) syz_io_uring_setup(0x6efe, &(0x7f0000000100)={0x0, 0xcc42, 0x2, 0x2, 0x3cf}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000280)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000240), 0x1, 0x1, 0x1}, 0x8001) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r7}) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r9 = dup2(r8, r8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r9, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r9, 0xc0182101, &(0x7f00000001c0)={r10}) r11 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x4101, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r6, 0x6, &(0x7f0000000400)={0x7, 0x0, &(0x7f00000003c0)=[r9, r0, r11]}, 0x3) mq_open(&(0x7f0000000000)='^\x00', 0x80, 0xd8, &(0x7f0000000040)={0x20, 0x168, 0xd918628, 0x4}) socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)) mq_open(&(0x7f0000000080)='[.:}$}\x00', 0x801, 0x100, &(0x7f00000000c0)={0x4, 0x7, 0x7f0, 0x1}) [ 682.546347][T23916] loop5: detected capacity change from 0 to 262160 [ 682.549316][T23918] loop0: detected capacity change from 0 to 262160 [ 682.582915][T23925] loop1: detected capacity change from 0 to 262160 11:02:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000085) 11:02:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000005) 11:02:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007500) [ 682.649654][T23935] loop5: detected capacity change from 0 to 262160 [ 682.682774][T23938] loop0: detected capacity change from 0 to 262160 11:03:00 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r1 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000001c0)={r2}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="fc000000", @ANYRES16=r3, @ANYBLOB="040028bd7000ffdbdf256700000008000100010000000c009900000000005b0000000800c40020000000b300c5007f432ed538d5936ba4b62fe2cf457eeb4387920150a2bed45f794b6568e93c5f445731de0972203d88bf90f7775e7d6eaf8724eea78ceb8736e9a75a36c2ebb915a56ebf78fe029dab300dc51625dc9d07b4c4c947ed83cf6e9da2e72e23071b41daa1f3ed2ed42b9c07f0a3f90b1f88f11bd724590bfb936cb74a80aa96450c61d419218a8507a37e3bbe524a1eb429b8e6ebc299bbfc8b41366100b8dd9956942b8e745f628122fe182e473379b1000800c300020000000800c400030000000800c30061000000"], 0xfc}, 0x1, 0x0, 0x0, 0x810}, 0x4000) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x9, 0x200}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000440)={r6, 0x0, r5}) 11:03:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000086) 11:03:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007400) 11:03:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007600) 11:03:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000006) 11:03:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002000) 11:03:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007700) [ 683.386721][T23950] loop1: detected capacity change from 0 to 262160 [ 683.390332][T23952] loop0: detected capacity change from 0 to 262160 [ 683.400597][T23953] loop5: detected capacity change from 0 to 262160 11:03:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000087) [ 683.491935][T23961] loop0: detected capacity change from 0 to 262160 [ 683.495208][T23963] loop1: detected capacity change from 0 to 262160 [ 683.521840][T23966] loop5: detected capacity change from 0 to 262160 11:03:00 executing program 3: sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8881}, 0x40000) socketpair(0x25, 0x80000, 0x1, &(0x7f0000000200)) 11:03:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007800) 11:03:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002000) 11:03:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000088) 11:03:00 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r2 = dup2(r1, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) close(r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0xc0182101, &(0x7f00000001c0)={r3}) ioctl$BTRFS_IOC_SET_FEATURES(r2, 0x40309439, &(0x7f0000000080)={0x2, 0x3, 0x8}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000440)={r5, 0x0, r4}) 11:03:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000007) 11:03:00 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000100)=0x0) fchown(r1, r2, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x200000, 0xd0) recvmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000100)}, 0x82) prctl$PR_GET_THP_DISABLE(0x2a) socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)) [ 683.945571][T23979] loop0: detected capacity change from 0 to 262160 [ 683.946634][T23980] loop1: detected capacity change from 0 to 262160 [ 683.955673][T23982] loop5: detected capacity change from 0 to 262160 11:03:00 executing program 3: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)="38c9961ceba6f5ebf7ad3ccd4d5c1aec9ba50b6fa65841c52aff9514f2387fd6a60546240e9740e1a3c3a6811c3b3261c79e03cee0c4d0e4331ce39f8ea4854c8416c7b9fa11e14320246571cd5022bd16062c15aa87332e70db8bab8035769e0dcef8aaa03ccd8c36a18e656874c4de696bee74dea6f58e0ac74019621cadbe444b8fa60f8bd6a164289c679be994327ed7586ddd90956edabd57182d235fc397f418062fbcf5a61e4b964f932c1345e95a4d7a6aa7cb3ff68f", 0xba) socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)) 11:03:00 executing program 1: r0 = syz_io_uring_setup(0x77d3, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x67}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000340)=0x0, &(0x7f00000004c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index, 0x0, 0x5}, 0x1) syz_io_uring_setup(0x6efe, &(0x7f0000000100)={0x0, 0xcc42, 0x2, 0x2, 0x3cf}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000280)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000240), 0x1, 0x1, 0x1}, 0x8001) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r7}) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r9 = dup2(r8, r8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r9, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r9, 0xc0182101, &(0x7f00000001c0)={r10}) r11 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x4101, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r6, 0x6, &(0x7f0000000400)={0x7, 0x0, &(0x7f00000003c0)=[r9, r0, r11]}, 0x3) mq_open(&(0x7f0000000000)='^\x00', 0x80, 0xd8, &(0x7f0000000040)={0x20, 0x168, 0xd918628, 0x4}) socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)) mq_open(&(0x7f0000000080)='[.:}$}\x00', 0x801, 0x100, &(0x7f00000000c0)={0x4, 0x7, 0x7f0, 0x1}) 11:03:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007900) 11:03:00 executing program 3: socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r1 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000001c0)={r2}) accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c) 11:03:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000089) 11:03:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008a) 11:03:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007a00) [ 684.100732][T23997] loop5: detected capacity change from 0 to 262160 [ 684.107593][T23999] loop0: detected capacity change from 0 to 262160 11:03:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008b) 11:03:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007b00) [ 684.192275][T24007] loop5: detected capacity change from 0 to 262160 [ 684.214885][T24009] loop0: detected capacity change from 0 to 262160 [ 684.281133][T24015] loop5: detected capacity change from 0 to 262160 [ 684.307753][T24017] loop0: detected capacity change from 0 to 262160 11:03:01 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r2 = dup2(r1, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) close(r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0xc0182101, &(0x7f00000001c0)={r3}) ioctl$BTRFS_IOC_SET_FEATURES(r2, 0x40309439, &(0x7f0000000080)={0x2, 0x3, 0x8}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000440)={r5, 0x0, r4}) 11:03:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000008) 11:03:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008c) 11:03:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007c00) [ 684.448644][T24025] loop0: detected capacity change from 0 to 262160 [ 684.450453][T24026] loop5: detected capacity change from 0 to 262160 11:03:01 executing program 1: socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x80, 0x7, 0x6, 0x10000}, {0x3, 0x1, 0x0, 0x8}]}) r1 = dup2(r0, r0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0xab, 0xff, 0x8, 0x3, 0x0, 0x5, 0x10000, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0xad6}, 0x8000, 0x1, 0x9, 0x2, 0x7ff, 0x800, 0x1, 0x0, 0x84, 0x0, 0xfffffffffffffffe}, 0x0, 0xd, r1, 0x0) readahead(0xffffffffffffffff, 0xfffffffffffffffa, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000001c0)={r2}) getsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:03:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007d00) 11:03:01 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)) dup2(r0, r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = getpgrp(0xffffffffffffffff) process_vm_readv(r2, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) r3 = syz_open_dev$MSR(&(0x7f0000000080), 0x7, 0x0) ioctl$X86_IOC_RDMSR_REGS(r3, 0xc02063a0, &(0x7f00000001c0)=[0x2, 0x1000, 0xebf, 0x80, 0x10001, 0x1ff, 0x1f, 0xfffff965]) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f0000000140)="d61c68aa7e47144f7c613a5e63473b13dc6b6f417f70b65ed9d8a830a273997239be11b19769c9b4a05ee95f5801249636ff6d1efc2018b0a53b8513650761ffa4a049d951a472076b88f127c346ea0ff19a353e3717f0e30fad74a94da7b7e303e7777279ac2dda2c374e614a1a8eab7a105eccb92bc907eb2ec220", 0x7c}], 0x1, 0x9, 0x1000) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) close(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x14) r4 = open(&(0x7f0000000240)='./file0\x00', 0xa00, 0x100) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000280)='/dev/cpu/#/msr\x00') signalfd4(r0, &(0x7f0000000000), 0x8, 0x800) socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)) 11:03:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008d) 11:03:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000009) 11:03:01 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r2 = dup2(r1, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) close(r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0xc0182101, &(0x7f00000001c0)={r3}) ioctl$BTRFS_IOC_SET_FEATURES(r2, 0x40309439, &(0x7f0000000080)={0x2, 0x3, 0x8}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000440)={r5, 0x0, r4}) [ 684.948898][T24036] loop0: detected capacity change from 0 to 262160 11:03:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007e00) [ 684.991732][T24045] loop5: detected capacity change from 0 to 262160 11:03:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008e) 11:03:01 executing program 3: r0 = geteuid() setresuid(r0, 0x0, 0xffffffffffffffff) r1 = geteuid() setresuid(r1, 0x0, 0xffffffffffffffff) r2 = geteuid() setresuid(r2, 0x0, 0xffffffffffffffff) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000140)={{}, {0x1, 0x3}, [], {0x4, 0x7}, [{0x8, 0x7}, {0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x6}}, 0x34, 0x1) socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)) 11:03:01 executing program 3: socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000004c40)=[{{&(0x7f0000004240)=@ethernet={0x6, @multicast}, 0x80, &(0x7f0000004440)=[{&(0x7f00000042c0)="27ef17a6f0d5376b443de08425095da9374e10cdc2f83ab5168656c3bc7e2b64de2548cfa95f99118f4a5e0856055906f7084bb2ed5b657f68499ed22370576cc1d86b19a1b12298e94d81c0722b2dfe3a8bd75b4d2267b4c0ebd0db526726f39c714c0bbc216b073901cd98183d06512f89c57677d06d207fb32c9976f87e692490441c9ce9356cfad91a2d9d57c932138a299a4b426b7bf3fb589e5077397838ab6db8c387ddbc1d4128829eb319f42a8e4b07d993590dc3d3fbbde6d9ef2567eac30022d5775aa52969998e3598055aaefbb44324281d8c", 0xd9}, {&(0x7f00000043c0)}, {&(0x7f0000004400)="4d5df0b1a56b6bcd56e9770f75626b6f5ef65d97860be5f6ebf6d81cf4c280a5ce608a08fd538ddf4e51f3a726bce90e4028c6f0ba8af086d89332522e09dda8", 0x40}], 0x3, &(0x7f0000004480)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x15e}}], 0x30}}, {{&(0x7f00000044c0)=@llc={0x1a, 0x30b, 0x9, 0x0, 0xfa, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x80, &(0x7f0000004700)=[{&(0x7f0000004540)="2fb3966a759948bebb06bd8ee72204cc5f37cdb8887f3e7b54ceffcfcc020f44b7684a8213b45ac0ca36edaf16fc8f04ca66e514f7f47c69b9787758e73b59cd95c9158c28bf", 0x46}, {&(0x7f00000045c0)="c246ecd15b09da4ffb58b0366410ea20d91f00c065b447f58279bef042c089a0a2d28f3e1cd8b740e181db44e7129a66f53cc5c4090d293e438b800c2efd0bdfb9457ad1b939ff3748c15de028d0f45884f9c784e2ab5d22817816d86f36fbb9309b6103581d61b7e01e18bbe92dae8af148a5a4ed3c198d2b3287c8d2bd42fdbbc3dfcba441fda1ae3b4069d33774cf1ccb6031f98951bce2ae0be98bca820b8afcc406bd82d1433cdd5b4de1e3b9939eff28ae57356563f2e90a", 0xbb}, {&(0x7f0000004680)="617a056feeac5fba011c671fdaa7561e6ec819aff4ddf8f0c7c599ede33ede43fbf97f32def515d2b8a45079d9cd72bcb0c6233ce4b862ae7c5f30e54d5d96c69fda11e539315354fb7fb762ffdaaa7f4c91e9c08178a9b656fcb6b0199b063f6351", 0x62}], 0x3, &(0x7f0000004740)=[@mark={{0x14, 0x1, 0x24, 0xdc}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x1e}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x1a}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x3ff}}, @mark={{0x14, 0x1, 0x24, 0x401}}], 0xc0}}, {{&(0x7f0000004800)=@l2={0x1f, 0x1, @none, 0x1000, 0x1}, 0x80, &(0x7f0000004b80)=[{&(0x7f0000004880)="aed325c6f04f5ff7f511eee2ecb6a613877916b08f68ee5fee0486d8b1316c4c7796c11e8ec7588522caccc7ff25b812be0f692851e39ef4bd8a399782f8002ded7be8f2219e448db63a28d33369d6a539396d5fb2b65488f342413bfed3a51f4a894597b49d1a44f1a340b20dfa84284b70b794ef70fc8f2a7bed7ac9248e3ac20201a18911664023c0ec6d59ebff3319221112bedef728b53c66a0d7f4dba635a0ce2d4d419a84ae1522d79822693a534e78a8a37d76168ec96f3898da819332511699bf815228d8b3e39e671a7ea50fb4570a", 0xd4}, {&(0x7f0000004980)="5db56ec1f8f50b", 0x7}, {&(0x7f00000049c0)='\n', 0x1}, {&(0x7f0000004a00)="afd6bb732801d845348d165ca895beb40dd5a3819a52fa186a24e8fa8b92bd9727398ff15fbe2ed8178a9277806263e3c8079fd877ed33c9ff510d09c33fdbba9d912da27a859306ae3c4c05bd1092d7c7c790cee327adf0d0191097b7d7ee0bfd41c07635a01106b9f3b95e89dcec4b3ffffb6ed553e3bd6117619681df124defcfe1b325ca090ebc15a3da0e68113bf69bbcf32ce3a985456f544417", 0x9d}, {&(0x7f0000004ac0)="79c1b972d986d60594a79ac5bec7085f0be3aa7d011b394f3ca493d2184abf69f4435a1b9f479120395555aca58e7b8d0842b6ebcef0ca2eb7903254024355a093443baf7badae17dcd67b13642f0baf9139f678518cb01024cb44c94c990f6cac25678d9bbb1f8ebcabb44be6446e9af1aa5673d527db83c4811f001d290e676b64d15a31b3ee0058ce752fc648", 0x8e}], 0x5, &(0x7f0000004c00)=[@timestamping={{0x14, 0x1, 0x25, 0x81}}], 0x18}}], 0x3, 0x200cc010) sendmmsg$inet_sctp(r1, &(0x7f0000004140)=[{&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x10001, @remote, 0x7fff}, 0x1c, &(0x7f0000001540)=[{&(0x7f0000000040)="7266f15b82bd6e15ff1cca0ebb39cae905a9cb60106b22c90bb4c52a68ce0386812981429b7d94a4d0f6d41c6b9379e0f009bcb2d2501690118d4677dd808dbbef6ed65e486ca7ea38cc28912079e79b71674ec8b001462825852645432b448f9e0b2de853b6ee19d87c04be5278af65f771", 0x72}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f00000000c0)="2182f9518621f32efe14607b779a841c2a9c62bab20a7fb88b2e4553655d01cba4063b04d3191e2cdcede17fc4a41d90c958d6ffb58de8aa7929c4ea8358ed7e4dfece305db8f1dc4a1f304f2d617dd8c38730208d7b8825656daa73e25dc9764d51c44adc1f64ce862811616a3425722d36746fac8c5bc904557e07e6e4c658bcf1330ecd2f72336e6c4a44bcd9ba111bf6600d888e7c623e384cc41fcee9b0831105fbae3787c3418fc7e452fcf885b257c07410889fc630ed0a61e6e26d25eece36b5c1754f7d535d92e48e58d29ac34938f144f90a12bff148bacfab00", 0xdf}, {&(0x7f0000001240)="228ffb3fb81d6258d6408492c06d903b18d5aa3a2e12ca54f3092825c8b496dca9498ca2213b57ea66acb324ee0c269fe2e4a828c8fa5a24e00d08cbc3b4da9c26f16a40b47e7fdceffedec6313f38201f51c1169a93b645fdd75b3556c90afad80050eec043358a8cc6e2aeb8d7bcea544ec0e53f74a62a54c9d6475f217b2b74121e4b401fca338d231935b524d2556af545ab2f6e0012a951611a07ae1d5ea3791cb1aa8f7d36eab8ff571e13d79030dce248cd142686d8d5cd141371a58f97fb3de8e3bd9fc0b084ba12d780cad04ab0c9c5db4db55bac7ecec56483b4d455b73f70b5a122382b64d8", 0xeb}, {&(0x7f0000001340)="8585b293965b4205836426e79cc4633462506dcd88689d4b6750ba5d8dd9f508cc708228627ba1aa9a4ec98f82fdca3457405c8f97e85049500482dd4bf448ffbd067600995576b746d4d4eef1976322f6b3289eb2a75770acd7eeabd872f85dedf6", 0x62}, {&(0x7f00000013c0)="ff0c2bc3258cd33f56b5584396b008cb7a968827952eb55e63fd6b2e92a43e773e8a0ac46f38c70a028dda5ab63bda70b3143e8807a6cb645b648abedee5261d9d04cb4e0f87f3811b01592b0e593e0f63d7", 0x52}, {&(0x7f0000001440)="916df57eabd007f45d5906055c23b941216e11edd56c12a6c08e94d425183456d606364aedd7f9d6af2476c60d482b493392e2848924d18f1a26d02e936175c7bc17b3f33891ba294401449a39b9f6a13f11489fbbec53b8937fc2088eb071cda8e2c057d67e2bc35ef65c05cadb83b414d92b768a7919d16b3160e93fe33a62321c8b7b837d8c18b46c1737af80375a6568bfb91936cdf3bb3775e8d2ca15d8b96347c331266c2fa46c97bcba1761f492bd57d858124910850ad90a1d6e8499651165ffc346935c6b5a43fa8c61dc1a9f57da26189348d8dc31e09879e2f52b1ceb", 0xe2}], 0x7, &(0x7f00000001c0)=[@init={0x18, 0x84, 0x0, {0x74, 0x29d, 0x8}}], 0x18, 0x40}, {&(0x7f00000015c0)=@in6={0xa, 0x4e22, 0xe0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x100}, 0x1c, &(0x7f0000001940)=[{&(0x7f0000001600)="881fac4e956c68026de8cd6fb7e5d87bb86d4dc897a85b7a3c8560d2ff9d94731f191e32baa256ef5da260b3ee2ab7f0e1593e6967b2937c849476c8901db5364aa2", 0x42}, {&(0x7f0000001680)="c97b0ec2be9bde3fc3699b3438ceeb03f75449648135f73b36f43ee7e100e2effe3751e1cff4ddcdd8d1b962be3dccee1b9ebb7f865293b7ed562e3bbf5627abf79476dafc2dd5340822671b5120974ce12582cc38e8867bb5b8bc4d28e80f30341b87f0eb03439343dc655ef7ea4b2226d59abed87586574fbfb7ca1a0d824f1c0567a1da4d8b5aa959465114ee219085fd34367e225073fde0a934114dbb6f0b9ed02a532b95eb321f24800e1850a0b876496e1f6becd2d10d01e60c1206aaa41f48924165348811d0d2e8548307b21f2a46e8", 0xd4}, {&(0x7f0000001780)="748234e703abee68c9f0d36ad47a94c4aa0cf876058d0e9ddd8ba94a4db6a9650f12e3f8114f6a2c3fd3c4393d13284aeda8510b0d50d8c0e3abc251bde63561ec87eeb3cfc61a527428c8e4638b51638b9cacbcfbfe94f41a81b96095e3148f1786ce72f87407dc87da6e", 0x6b}, {&(0x7f0000001800)="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", 0xff}, {&(0x7f0000001900)="b9ce", 0x2}], 0x5, &(0x7f00000019c0)=[@sndinfo={0x20, 0x84, 0x2, {0x3, 0xc, 0x4, 0x8}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x64010102}, @authinfo={0x18, 0x84, 0x6, {0x4}}, @sndinfo={0x20, 0x84, 0x2, {0x2, 0x8008, 0x3, 0x2}}, @prinfo={0x18}], 0xa0}, {&(0x7f0000001a80)=@in={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002c80)=[{&(0x7f0000001ac0)="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", 0x1000}, {&(0x7f0000002ac0)="9bda9beffca39f2cd73823dfcd25e76c54f4001785a8c7fa1fe81a22403c76716081b40c997cc328f25e80702768be8c4363da6f5672d403b2cd7d7d769aceb9a81c768aa214b028f98f5bcf44888aa02b7f5c354189f4bcedbbb1b4dae1414890d03c776863a0230ee4f9d1adf350fb8cbc27", 0x73}, {&(0x7f0000002b40)="098bf38b64fc6e65696fe8ae3db04027e29b6a8695256202373a7b5a77ba0480cfe573d305c869afb8e77b5147c9cf3a12f3caa9a4d30ae5c7c9d647034a286be183869c6d3b827b2b73ab0967ab689baf58137328bd9ac23ebe7f3d6434da3279377775d36250a0bb90b40dc944bb3c5c73897c4527d191fa2b0d014965de7c364b09f4", 0x84}, {&(0x7f0000002c00)="26079f2f62e5bf3c03e4fed90f00d404088a9da1ea5cad17f914151c25f02fc591aa03c8bb5de11b97bfa2f61b39fb0be875b7b5cee4725c194a6283886cab1a81b93450caf2dd961d6bd5e437eb3787e73ff9a7d4ca40f822cc0d34f57a8cfdac1e82b0aa5ad822579863e87efb35d61c441dcf232f41be12eb", 0x7a}], 0x4, &(0x7f0000002cc0)=[@sndrcv={0x30, 0x84, 0x1, {0x32c, 0xfbff, 0x2, 0x9, 0x10000, 0x6, 0xfff, 0x200}}, @authinfo={0x18, 0x84, 0x6, {0x5}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, '\x00', 0x14}}, @dstaddrv6={0x20, 0x84, 0x8, @private2}, @authinfo={0x18}], 0xa0, 0x80}, {&(0x7f0000002d80)=@in={0x2, 0x4e24, @local}, 0x10, &(0x7f0000004080)=[{&(0x7f0000002dc0)="def330bf71f54ed37222d076a143354c38e71d593f4ed048650a88e300a088c8b2ddc551834e6531864d118ab91103e654b36e808bdd2b93ab31ab673c8e9f452400a1e1dbdb1703898595b4", 0x4c}, {&(0x7f0000002e40)="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", 0x1000}, {&(0x7f0000003e40)="fded02d929a96cbef6c5fb71df9ed94c683914ce71b303a9a6156a3dd5a369f4aa04dfb4472e484720997399dce84d10137c842d6433189231f6753759d459c1ba", 0x41}, {&(0x7f0000003ec0)="84f74c44cf68a4c9b5830702a95d3bbf3de87656c695013e3fc6cf8924363307db61a611f8a6fcdec7d526fb9ca6a519c929388bb12bc9904759f69feaed7370c4e7820081ef18c49ac10680dd7038c81741f941052ca5d5269e396e371f91dcad15139e2179777ecf13cac1a21338342f031c84986a075fe5", 0x79}, {&(0x7f0000003f40)="bd477bf74e12d5a1c5b261e41fd91b4e9e01a3e3ffb1a127ee144d84b79e413cc344f3d1a0bd19d7cf5f5933098a570bccf6089ec2bc02e3f1d32e6e125694cee21d49c74b81d03b214da60e725566db5338db1612e448dcb0fa3dfb939261e8e779f403eaab50d4bf53aa787b98a8d9659df7abab28170c7b58f3321db0a9c4cd053e54ef14a6d774c83c20027fda7e16c888792c2b56bcc4014b8e24ee239e477eb1b4b01645ba7114918289a8c7482c08d93dbff1e133247f611e041e7649f1496b3907ed8136233f", 0xca}, {&(0x7f0000004040)="63d69fa223653e20b609b288d3a145", 0xf}], 0x6, &(0x7f0000004100)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x201, 0xad7c, 0x6}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}], 0x38, 0x8804}], 0x4, 0x24000894) socket$inet(0x2, 0x180004, 0x3) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r3 = dup2(r2, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0xc0182101, &(0x7f00000001c0)={r4}) recvmmsg(r3, &(0x7f0000007200)=[{{&(0x7f0000004d00)=@nfc, 0x80, &(0x7f0000004e40)=[{&(0x7f00000043c0)=""/14, 0xe}, {&(0x7f0000004d80)=""/103, 0x67}, {&(0x7f0000004e00)=""/4, 0x4}], 0x3}, 0x40}, {{&(0x7f0000004e80)=@phonet, 0x80, &(0x7f0000007100)=[{&(0x7f0000004f00)=""/225, 0xe1}, {&(0x7f0000005000)=""/246, 0xf6}, {&(0x7f0000005100)=""/4096, 0x1000}, {&(0x7f0000006100)=""/4096, 0x1000}], 0x4, &(0x7f0000007140)=""/189, 0xbd}, 0x800}], 0x2, 0x1, &(0x7f0000007280)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r7}) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000072c0)={0x0, 0x8, 0x200, 0x8}, &(0x7f0000007300)=0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000007340)=@assoc_id=r8, &(0x7f0000007380)=0x4) 11:03:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008f) [ 685.083777][T24058] loop0: detected capacity change from 0 to 262160 [ 685.109775][T24061] loop5: detected capacity change from 0 to 262160 11:03:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007f00) [ 685.226090][T24067] loop5: detected capacity change from 0 to 262160 [ 685.233625][T24070] loop0: detected capacity change from 0 to 262160 11:03:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001c) 11:03:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) 11:03:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000090) 11:03:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007f68) 11:03:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000021) [ 685.817517][T24080] loop0: detected capacity change from 0 to 262160 [ 685.821413][T24083] loop5: detected capacity change from 0 to 262160 [ 685.824351][T24079] loop2: detected capacity change from 0 to 262160 [ 685.844689][T24084] loop1: detected capacity change from 0 to 262160 11:03:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008100) 11:03:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000091) 11:03:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000014) 11:03:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000011) [ 685.954128][T24091] loop0: detected capacity change from 0 to 262160 [ 685.954176][T24090] loop5: detected capacity change from 0 to 262160 [ 685.973142][T24093] loop2: detected capacity change from 0 to 262160 [ 685.981768][T24095] loop1: detected capacity change from 0 to 262160 11:03:03 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000440)={r2, 0x0, r1}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x9, &(0x7f0000000080)=[{0x9, 0x0, 0x14, 0x80000}, {0x1ff, 0x3c, 0x0, 0x7fffffff}, {0x80, 0xff, 0x5, 0x3}, {0x5, 0x8, 0x20, 0x7}, {0x3, 0xf9, 0x3, 0xfffffff8}, {0x0, 0x0, 0x1}, {0x9, 0x6, 0x2, 0xe5b}, {0x8, 0xa4, 0x4, 0x81}, {0xff74, 0x0, 0x5, 0x9}]}) 11:03:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000092) 11:03:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008200) 11:03:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000e) 11:03:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000b) 11:03:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008300) [ 686.452361][T24104] loop0: detected capacity change from 0 to 262160 [ 686.456236][T24105] loop1: detected capacity change from 0 to 262160 [ 686.469082][T24106] loop5: detected capacity change from 0 to 262160 11:03:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000093) 11:03:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000b) 11:03:03 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r1 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000340)={0x0}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r4 = dup2(r3, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)={0x5c, r6, 0xe17, 0x0, 0x0, {0x1, 0x0, 0x6000}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local={0xfe, 0x0}}]}, 0x5c}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r6, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_SESSION_ID={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000001c0)={r2}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x53, 0xff, 0xfff, 0x2c, @mcast1, @ipv4={'\x00', '\xff\xff', @remote}, 0x80, 0x8, 0x800, 0x5370}}) 11:03:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008400) 11:03:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000094) 11:03:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000b3) [ 686.564232][T24115] loop0: detected capacity change from 0 to 262160 [ 686.580117][T24117] loop5: detected capacity change from 0 to 262160 [ 686.592251][T24119] loop1: detected capacity change from 0 to 262160 [ 686.651036][T24123] loop5: detected capacity change from 0 to 262160 [ 686.660852][T24125] loop0: detected capacity change from 0 to 262160 [ 686.673118][T24129] loop1: detected capacity change from 0 to 262160 [ 687.284523][ T24] kauditd_printk_skb: 29845 callbacks suppressed [ 687.284536][ T24] audit: type=1326 audit(1638788584.089:1059370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 687.315167][ T24] audit: type=1326 audit(1638788584.089:1059371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=33 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 687.339331][ T24] audit: type=1326 audit(1638788584.089:1059372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 687.363601][ T24] audit: type=1326 audit(1638788584.089:1059373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 687.387976][ T24] audit: type=1326 audit(1638788584.089:1059374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 687.412379][ T24] audit: type=1326 audit(1638788584.089:1059375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 687.436701][ T24] audit: type=1326 audit(1638788584.089:1059376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008500) 11:03:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000007) 11:03:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000c) 11:03:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000095) 11:03:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000002) [ 687.461809][ T24] audit: type=1326 audit(1638788584.089:1059377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 687.486161][ T24] audit: type=1326 audit(1638788584.089:1059378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 687.510715][ T24] audit: type=1326 audit(1638788584.089:1059379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:04 executing program 3: socketpair(0x2c, 0x5, 0x3, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$can_raw(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@can={{0x3, 0x0, 0x0, 0x1}, 0x8, 0x2, 0x0, 0x0, "6dde81746163cb5d"}, 0x10}, 0x1, 0x0, 0x0, 0x20040800}, 0x10) [ 687.546775][T24141] loop5: detected capacity change from 0 to 262160 [ 687.547135][T24142] loop1: detected capacity change from 0 to 262160 [ 687.560303][T24143] loop0: detected capacity change from 0 to 262160 11:03:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008600) [ 687.591337][T24146] loop2: detected capacity change from 0 to 262160 11:03:04 executing program 3: ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) ioctl$SIOCX25SCAUSEDIAG(0xffffffffffffffff, 0x89ec, &(0x7f0000000000)={0x6, 0x1}) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x10000000) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r2 = dup2(r1, r1) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0xc0182101, &(0x7f00000001c0)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0xc0182101, &(0x7f00000001c0)={r5}) r6 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r9}}, 0x10001) syz_io_uring_submit(0x0, r0, &(0x7f0000000180)=@IORING_OP_STATX={0x15, 0x0, 0x0, r2, &(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x214, 0x100, 0x0, {0x0, r9}}, 0x6) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r10, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r10, 0xc0182101, &(0x7f00000001c0)={r11}) ioctl$TUNATTACHFILTER(r10, 0x401054d5, &(0x7f0000000280)={0x3, &(0x7f0000000240)=[{0x2, 0x8, 0x80, 0x3}, {0x7ff, 0x2, 0x3, 0x6}, {0x1, 0x0, 0x0, 0xffffffff}]}) socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)) 11:03:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a6) 11:03:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000096) 11:03:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a4) [ 687.671950][T24153] loop0: detected capacity change from 0 to 262160 [ 687.686005][T24155] loop1: detected capacity change from 0 to 262160 11:03:04 executing program 1: socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)={0x54, r2, 0x1b746d17da50fc5b, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, r2, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x8}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x4}}]}, 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x44001) 11:03:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008700) 11:03:04 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001280)={'tunl0\x00', &(0x7f0000001240)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000440)={r3, 0x0, r2}) 11:03:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000097) [ 687.737235][T24158] loop2: detected capacity change from 0 to 262160 [ 687.747243][T24160] loop5: detected capacity change from 0 to 262160 [ 687.791918][T24166] loop0: detected capacity change from 0 to 262160 [ 687.821134][T24169] loop5: detected capacity change from 0 to 262160 11:03:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000d) 11:03:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008a) 11:03:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008800) 11:03:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000098) [ 687.903354][T24177] loop0: detected capacity change from 0 to 262160 [ 687.903425][T24176] loop1: detected capacity change from 0 to 262160 [ 687.915330][T24179] loop5: detected capacity change from 0 to 262160 11:03:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 1) 11:03:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008900) 11:03:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000099) 11:03:05 executing program 1: socketpair(0x25, 0x5, 0x0, &(0x7f0000000200)) 11:03:05 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000f) 11:03:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 1) [ 688.617298][T24195] loop5: detected capacity change from 0 to 262160 [ 688.621431][T24196] loop0: detected capacity change from 0 to 262160 [ 688.638475][T24198] loop1: detected capacity change from 0 to 262160 [ 688.649982][T24200] loop3: detected capacity change from 0 to 262160 11:03:05 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) (fail_nth: 1) [ 688.667448][T24198] FAULT_INJECTION: forcing a failure. [ 688.667448][T24198] name failslab, interval 1, probability 0, space 0, times 0 [ 688.680112][T24198] CPU: 0 PID: 24198 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 688.688985][T24198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.689398][T24203] FAULT_INJECTION: forcing a failure. [ 688.689398][T24203] name failslab, interval 1, probability 0, space 0, times 0 [ 688.699038][T24198] Call Trace: [ 688.699048][T24198] [ 688.699055][T24198] dump_stack_lvl+0xd6/0x122 [ 688.722764][T24198] dump_stack+0x11/0x1b [ 688.726912][T24198] should_fail+0x23c/0x250 [ 688.731321][T24198] ? alloc_pipe_info+0xac/0x350 [ 688.736204][T24198] __should_failslab+0x81/0x90 [ 688.740957][T24198] should_failslab+0x5/0x20 [ 688.745444][T24198] kmem_cache_alloc_trace+0x52/0x350 [ 688.750762][T24198] alloc_pipe_info+0xac/0x350 [ 688.755454][T24198] splice_direct_to_actor+0x5f7/0x650 [ 688.760820][T24198] ? security_file_permission+0x7c/0xa0 [ 688.766366][T24198] ? do_splice_direct+0x190/0x190 [ 688.771452][T24198] ? security_file_permission+0x87/0xa0 [ 688.776985][T24198] do_splice_direct+0x106/0x190 [ 688.781992][T24198] do_sendfile+0x675/0xc40 [ 688.786394][T24198] __x64_sys_sendfile64+0x102/0x140 [ 688.791577][T24198] do_syscall_64+0x44/0xd0 [ 688.796036][T24198] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 688.801925][T24198] RIP: 0033:0x7f0b7105bae9 [ 688.806382][T24198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 688.826002][T24198] RSP: 002b:00007f0b707d2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 688.834487][T24198] RAX: ffffffffffffffda RBX: 00007f0b7116ef60 RCX: 00007f0b7105bae9 [ 688.842445][T24198] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 688.850410][T24198] RBP: 00007f0b707d21d0 R08: 0000000000000000 R09: 0000000000000000 [ 688.858388][T24198] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 688.866346][T24198] R13: 00007ffe41241b3f R14: 00007f0b707d2300 R15: 0000000000022000 [ 688.874305][T24198] [ 688.877312][T24203] CPU: 1 PID: 24203 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 688.886153][T24203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.896222][T24203] Call Trace: [ 688.899494][T24203] [ 688.902424][T24203] dump_stack_lvl+0xd6/0x122 [ 688.907019][T24203] dump_stack+0x11/0x1b [ 688.911250][T24203] should_fail+0x23c/0x250 [ 688.915726][T24203] ? key_user_lookup+0x106/0x290 [ 688.920739][T24203] __should_failslab+0x81/0x90 [ 688.925509][T24203] should_failslab+0x5/0x20 [ 688.930091][T24203] kmem_cache_alloc_trace+0x52/0x350 [ 688.935380][T24203] ? selinux_capable+0x34/0x40 [ 688.940150][T24203] key_user_lookup+0x106/0x290 [ 688.945028][T24203] keyctl_chown_key+0x249/0x580 [ 688.949897][T24203] __se_sys_keyctl+0x480/0x9e0 [ 688.954733][T24203] ? __fget_files+0x20d/0x220 [ 688.959418][T24203] ? debug_smp_processor_id+0x18/0x20 [ 688.964921][T24203] ? fpregs_assert_state_consistent+0x7e/0x90 [ 688.970991][T24203] __x64_sys_keyctl+0x63/0x70 [ 688.975665][T24203] do_syscall_64+0x44/0xd0 [ 688.980079][T24203] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 688.986141][T24203] RIP: 0033:0x7f0891846ae9 [ 688.990550][T24203] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 689.010197][T24203] RSP: 002b:00007f0890fbd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 11:03:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009a) [ 689.018691][T24203] RAX: ffffffffffffffda RBX: 00007f0891959f60 RCX: 00007f0891846ae9 [ 689.026663][T24203] RDX: 0000000000000cff RSI: 0000000033a059bc RDI: 0000000000000004 [ 689.035001][T24203] RBP: 00007f0890fbd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 689.042984][T24203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 689.050957][T24203] R13: 00007ffc82ad702f R14: 00007f0890fbd300 R15: 0000000000022000 [ 689.059007][T24203] 11:03:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 2) [ 689.065158][T24200] FAULT_INJECTION: forcing a failure. [ 689.065158][T24200] name failslab, interval 1, probability 0, space 0, times 0 [ 689.077906][T24200] CPU: 0 PID: 24200 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 689.086728][T24200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.096786][T24200] Call Trace: [ 689.100082][T24200] [ 689.103005][T24200] dump_stack_lvl+0xd6/0x122 [ 689.107659][T24200] dump_stack+0x11/0x1b [ 689.111831][T24200] should_fail+0x23c/0x250 [ 689.116243][T24200] ? alloc_pipe_info+0xac/0x350 [ 689.121098][T24200] __should_failslab+0x81/0x90 [ 689.125915][T24200] should_failslab+0x5/0x20 [ 689.130435][T24200] kmem_cache_alloc_trace+0x52/0x350 [ 689.135721][T24200] alloc_pipe_info+0xac/0x350 [ 689.140403][T24200] splice_direct_to_actor+0x5f7/0x650 [ 689.145969][T24200] ? security_file_permission+0x7c/0xa0 [ 689.151519][T24200] ? do_splice_direct+0x190/0x190 [ 689.156597][T24200] ? security_file_permission+0x87/0xa0 [ 689.162171][T24200] do_splice_direct+0x106/0x190 [ 689.167061][T24200] do_sendfile+0x675/0xc40 [ 689.171476][T24200] __x64_sys_sendfile64+0x102/0x140 [ 689.176670][T24200] do_syscall_64+0x44/0xd0 [ 689.181124][T24200] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 689.187099][T24200] RIP: 0033:0x7fe1cb921ae9 [ 689.191510][T24200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 689.211258][T24200] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 11:03:06 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) (fail_nth: 2) 11:03:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008a00) 11:03:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 2) [ 689.219838][T24200] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 689.227816][T24200] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 689.235799][T24200] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 689.243766][T24200] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 689.251756][T24200] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 689.259727][T24200] [ 689.283811][T24208] FAULT_INJECTION: forcing a failure. [ 689.283811][T24208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 689.296939][T24208] CPU: 0 PID: 24208 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 689.305779][T24208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.315909][T24208] Call Trace: [ 689.319183][T24208] [ 689.322111][T24208] dump_stack_lvl+0xd6/0x122 [ 689.326721][T24208] dump_stack+0x11/0x1b [ 689.330875][T24208] should_fail+0x23c/0x250 [ 689.335344][T24208] should_fail_usercopy+0x16/0x20 [ 689.340639][T24208] _copy_to_user+0x1c/0x90 [ 689.345103][T24208] simple_read_from_buffer+0xab/0x120 [ 689.350474][T24208] proc_fail_nth_read+0x10d/0x150 [ 689.355509][T24208] ? proc_fault_inject_write+0x230/0x230 [ 689.361163][T24208] vfs_read+0x1e6/0x750 [ 689.365345][T24208] ? __fget_files+0x20d/0x220 [ 689.370024][T24208] ksys_read+0xd9/0x190 [ 689.374208][T24208] __x64_sys_read+0x3e/0x50 [ 689.378737][T24208] do_syscall_64+0x44/0xd0 [ 689.383192][T24208] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 689.389084][T24208] RIP: 0033:0x7f08917f969c [ 689.393491][T24208] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 689.413668][T24208] RSP: 002b:00007f0890fbd170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 689.422107][T24208] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f08917f969c 11:03:06 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) [ 689.430082][T24208] RDX: 000000000000000f RSI: 00007f0890fbd1e0 RDI: 0000000000000004 [ 689.438046][T24208] RBP: 00007f0890fbd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 689.446062][T24208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 689.454107][T24208] R13: 00007ffc82ad702f R14: 00007f0890fbd300 R15: 0000000000022000 [ 689.462075][T24208] 11:03:06 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x2, r4, r2, 0x0) [ 689.482544][T24212] loop0: detected capacity change from 0 to 262160 [ 689.493574][T24215] loop1: detected capacity change from 0 to 262160 [ 689.502246][T24217] loop5: detected capacity change from 0 to 262160 [ 689.513859][T24220] loop3: detected capacity change from 0 to 262160 [ 689.522950][T24215] FAULT_INJECTION: forcing a failure. [ 689.522950][T24215] name failslab, interval 1, probability 0, space 0, times 0 [ 689.535696][T24215] CPU: 0 PID: 24215 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 689.544507][T24215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.554617][T24215] Call Trace: [ 689.557916][T24215] [ 689.560845][T24215] dump_stack_lvl+0xd6/0x122 [ 689.565510][T24215] dump_stack+0x11/0x1b [ 689.569674][T24215] should_fail+0x23c/0x250 [ 689.574141][T24215] ? kcalloc+0x32/0x40 [ 689.578283][T24215] __should_failslab+0x81/0x90 [ 689.583098][T24215] should_failslab+0x5/0x20 [ 689.587624][T24215] __kmalloc+0x6f/0x370 [ 689.591854][T24215] ? kmem_cache_alloc_trace+0x24b/0x350 [ 689.597399][T24215] kcalloc+0x32/0x40 [ 689.601299][T24215] alloc_pipe_info+0x1be/0x350 [ 689.602090][T24220] FAULT_INJECTION: forcing a failure. [ 689.602090][T24220] name failslab, interval 1, probability 0, space 0, times 0 [ 689.606069][T24215] splice_direct_to_actor+0x5f7/0x650 [ 689.606097][T24215] ? security_file_permission+0x7c/0xa0 [ 689.629574][T24215] ? do_splice_direct+0x190/0x190 [ 689.634684][T24215] ? security_file_permission+0x87/0xa0 [ 689.640215][T24215] do_splice_direct+0x106/0x190 [ 689.645052][T24215] do_sendfile+0x675/0xc40 [ 689.649453][T24215] __x64_sys_sendfile64+0x102/0x140 [ 689.654794][T24215] do_syscall_64+0x44/0xd0 [ 689.659198][T24215] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 689.665078][T24215] RIP: 0033:0x7f0b7105bae9 [ 689.669475][T24215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 689.689160][T24215] RSP: 002b:00007f0b707d2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 689.697555][T24215] RAX: ffffffffffffffda RBX: 00007f0b7116ef60 RCX: 00007f0b7105bae9 [ 689.705558][T24215] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 689.713550][T24215] RBP: 00007f0b707d21d0 R08: 0000000000000000 R09: 0000000000000000 [ 689.721503][T24215] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 11:03:06 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x3, r4, r2, 0x0) 11:03:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 3) [ 689.729479][T24215] R13: 00007ffe41241b3f R14: 00007f0b707d2300 R15: 0000000000022000 [ 689.737438][T24215] [ 689.740438][T24220] CPU: 1 PID: 24220 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 689.749203][T24220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.759261][T24220] Call Trace: [ 689.762560][T24220] [ 689.765531][T24220] dump_stack_lvl+0xd6/0x122 [ 689.770224][T24220] dump_stack+0x11/0x1b [ 689.774384][T24220] should_fail+0x23c/0x250 [ 689.778804][T24220] ? kcalloc+0x32/0x40 [ 689.782880][T24220] __should_failslab+0x81/0x90 [ 689.787736][T24220] should_failslab+0x5/0x20 [ 689.792223][T24220] __kmalloc+0x6f/0x370 [ 689.796413][T24220] ? kmem_cache_alloc_trace+0x24b/0x350 [ 689.802005][T24220] kcalloc+0x32/0x40 [ 689.805888][T24220] alloc_pipe_info+0x1be/0x350 [ 689.810636][T24220] splice_direct_to_actor+0x5f7/0x650 [ 689.815994][T24220] ? security_file_permission+0x7c/0xa0 [ 689.821609][T24220] ? do_splice_direct+0x190/0x190 [ 689.826694][T24220] ? security_file_permission+0x87/0xa0 [ 689.832256][T24220] do_splice_direct+0x106/0x190 [ 689.837173][T24220] do_sendfile+0x675/0xc40 [ 689.841575][T24220] __x64_sys_sendfile64+0x102/0x140 [ 689.846752][T24220] do_syscall_64+0x44/0xd0 [ 689.851177][T24220] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 689.857101][T24220] RIP: 0033:0x7fe1cb921ae9 [ 689.861492][T24220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 689.881074][T24220] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 689.889466][T24220] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 689.897440][T24220] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 689.905393][T24220] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 689.913349][T24220] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 689.921355][T24220] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 689.929313][T24220] 11:03:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000010) 11:03:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009b) 11:03:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008b00) 11:03:06 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x5, r4, r2, 0x0) 11:03:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 3) 11:03:06 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x6, r4, r2, 0x0) [ 690.000167][T24238] loop1: detected capacity change from 0 to 262160 [ 690.001469][T24239] loop0: detected capacity change from 0 to 262160 [ 690.007176][T24240] loop5: detected capacity change from 0 to 262160 [ 690.021189][T24242] loop3: detected capacity change from 0 to 262160 [ 690.032475][T24242] FAULT_INJECTION: forcing a failure. [ 690.032475][T24242] name failslab, interval 1, probability 0, space 0, times 0 [ 690.045164][T24242] CPU: 0 PID: 24242 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 690.053968][T24242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.064027][T24242] Call Trace: [ 690.067301][T24242] [ 690.070256][T24242] dump_stack_lvl+0xd6/0x122 [ 690.074855][T24242] dump_stack+0x11/0x1b [ 690.079005][T24242] should_fail+0x23c/0x250 [ 690.083423][T24242] ? kmalloc_array+0x2d/0x40 [ 690.088270][T24242] __should_failslab+0x81/0x90 [ 690.093101][T24242] should_failslab+0x5/0x20 [ 690.097631][T24242] __kmalloc+0x6f/0x370 [ 690.101795][T24242] kmalloc_array+0x2d/0x40 [ 690.106263][T24242] iter_file_splice_write+0xd5/0x790 [ 690.111599][T24242] ? atime_needs_update+0x2ba/0x390 [ 690.116805][T24242] ? touch_atime+0x11f/0x2e0 [ 690.121504][T24242] ? generic_file_splice_read+0x2a9/0x330 [ 690.127316][T24242] ? splice_from_pipe+0xd0/0xd0 [ 690.132165][T24242] direct_splice_actor+0x80/0xa0 [ 690.137263][T24242] splice_direct_to_actor+0x345/0x650 [ 690.142730][T24242] ? do_splice_direct+0x190/0x190 [ 690.147940][T24242] do_splice_direct+0x106/0x190 [ 690.152830][T24242] do_sendfile+0x675/0xc40 [ 690.157252][T24242] __x64_sys_sendfile64+0x102/0x140 [ 690.162522][T24242] do_syscall_64+0x44/0xd0 [ 690.166943][T24242] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 690.172930][T24242] RIP: 0033:0x7fe1cb921ae9 [ 690.177353][T24242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.196970][T24242] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 690.205382][T24242] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 690.213525][T24242] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 690.221589][T24242] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 690.229558][T24242] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 690.237551][T24242] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 690.245541][T24242] [ 690.251858][T24238] FAULT_INJECTION: forcing a failure. [ 690.251858][T24238] name failslab, interval 1, probability 0, space 0, times 0 [ 690.264734][T24238] CPU: 1 PID: 24238 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 690.273551][T24238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.283600][T24238] Call Trace: [ 690.286876][T24238] [ 690.289803][T24238] dump_stack_lvl+0xd6/0x122 [ 690.294395][T24238] dump_stack+0x11/0x1b 11:03:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 4) [ 690.298554][T24238] should_fail+0x23c/0x250 [ 690.303038][T24238] ? kmalloc_array+0x2d/0x40 [ 690.307668][T24238] __should_failslab+0x81/0x90 [ 690.312429][T24238] should_failslab+0x5/0x20 [ 690.316926][T24238] __kmalloc+0x6f/0x370 [ 690.321169][T24238] kmalloc_array+0x2d/0x40 [ 690.325618][T24238] iter_file_splice_write+0xd5/0x790 [ 690.330910][T24238] ? atime_needs_update+0x2ba/0x390 [ 690.336183][T24238] ? touch_atime+0x11f/0x2e0 [ 690.340850][T24238] ? generic_file_splice_read+0x2a9/0x330 [ 690.346635][T24238] ? splice_from_pipe+0xd0/0xd0 [ 690.351502][T24238] direct_splice_actor+0x80/0xa0 [ 690.356440][T24238] splice_direct_to_actor+0x345/0x650 [ 690.361963][T24238] ? do_splice_direct+0x190/0x190 [ 690.366984][T24238] do_splice_direct+0x106/0x190 [ 690.371830][T24238] do_sendfile+0x675/0xc40 [ 690.376329][T24238] __x64_sys_sendfile64+0x102/0x140 [ 690.381526][T24238] do_syscall_64+0x44/0xd0 [ 690.385944][T24238] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 690.391979][T24238] RIP: 0033:0x7f0b7105bae9 [ 690.396387][T24238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.416415][T24238] RSP: 002b:00007f0b707d2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 690.425240][T24238] RAX: ffffffffffffffda RBX: 00007f0b7116ef60 RCX: 00007f0b7105bae9 [ 690.433253][T24238] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 690.441227][T24238] RBP: 00007f0b707d21d0 R08: 0000000000000000 R09: 0000000000000000 11:03:07 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x7, r4, r2, 0x0) 11:03:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 4) [ 690.449196][T24238] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 690.457193][T24238] R13: 00007ffe41241b3f R14: 00007f0b707d2300 R15: 0000000000022000 [ 690.465172][T24238] 11:03:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008c00) 11:03:07 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x8, r4, r2, 0x0) [ 690.501785][T24250] loop3: detected capacity change from 0 to 262160 [ 690.532706][T24255] loop0: detected capacity change from 0 to 262160 [ 690.540763][T24250] FAULT_INJECTION: forcing a failure. [ 690.540763][T24250] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 690.554239][T24250] CPU: 0 PID: 24250 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 690.562998][T24250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.573050][T24250] Call Trace: [ 690.576418][T24250] [ 690.579340][T24250] dump_stack_lvl+0xd6/0x122 [ 690.583928][T24250] dump_stack+0x11/0x1b [ 690.588143][T24250] should_fail+0x23c/0x250 [ 690.592559][T24250] __alloc_pages+0x102/0x330 [ 690.597148][T24250] alloc_pages+0x382/0x3d0 [ 690.601623][T24250] folio_alloc+0x1a/0x20 [ 690.605854][T24250] filemap_alloc_folio+0x53/0xf0 [ 690.610858][T24250] __filemap_get_folio+0x443/0x690 [ 690.616057][T24250] pagecache_get_page+0x26/0xe0 [ 690.620915][T24250] grab_cache_page_write_begin+0x3f/0x50 [ 690.626543][T24250] cont_write_begin+0x4ab/0x7b0 [ 690.631393][T24250] fat_write_begin+0x61/0xf0 [ 690.635993][T24250] ? fat_block_truncate_page+0x30/0x30 [ 690.641468][T24250] generic_perform_write+0x1c8/0x400 [ 690.646825][T24250] __generic_file_write_iter+0x195/0x2b0 [ 690.652505][T24250] ? generic_write_checks+0x250/0x290 [ 690.658006][T24250] generic_file_write_iter+0x75/0x130 [ 690.663447][T24250] do_iter_readv_writev+0x2de/0x380 [ 690.668726][T24250] do_iter_write+0x192/0x5c0 [ 690.673324][T24250] ? splice_from_pipe_next+0x34f/0x3b0 [ 690.678834][T24250] ? kmalloc_array+0x2d/0x40 [ 690.683519][T24250] vfs_iter_write+0x4c/0x70 [ 690.688045][T24250] iter_file_splice_write+0x43a/0x790 [ 690.693459][T24250] ? splice_from_pipe+0xd0/0xd0 [ 690.698320][T24250] direct_splice_actor+0x80/0xa0 [ 690.703282][T24250] splice_direct_to_actor+0x345/0x650 [ 690.708825][T24250] ? do_splice_direct+0x190/0x190 [ 690.713927][T24250] do_splice_direct+0x106/0x190 [ 690.718839][T24250] do_sendfile+0x675/0xc40 [ 690.723260][T24250] __x64_sys_sendfile64+0x102/0x140 [ 690.728464][T24250] do_syscall_64+0x44/0xd0 [ 690.732895][T24250] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 690.738788][T24250] RIP: 0033:0x7fe1cb921ae9 [ 690.743198][T24250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.762799][T24250] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 690.771335][T24250] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 690.779303][T24250] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 690.787267][T24250] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 11:03:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 5) [ 690.795519][T24250] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 690.803524][T24250] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 690.811534][T24250] [ 690.815005][T24258] loop1: detected capacity change from 0 to 262160 [ 690.918082][T24266] loop3: detected capacity change from 0 to 262160 [ 690.931399][T24266] FAULT_INJECTION: forcing a failure. [ 690.931399][T24266] name failslab, interval 1, probability 0, space 0, times 0 [ 690.944092][T24266] CPU: 1 PID: 24266 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 690.952893][T24266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.962940][T24266] Call Trace: [ 690.966260][T24266] [ 690.969187][T24266] dump_stack_lvl+0xd6/0x122 [ 690.973780][T24266] dump_stack+0x11/0x1b [ 690.977937][T24266] should_fail+0x23c/0x250 [ 690.982361][T24266] ? mempool_alloc_slab+0x16/0x20 [ 690.987404][T24266] __should_failslab+0x81/0x90 [ 690.992165][T24266] should_failslab+0x5/0x20 [ 690.996713][T24266] kmem_cache_alloc+0x4f/0x320 [ 691.001478][T24266] mempool_alloc_slab+0x16/0x20 [ 691.006359][T24266] ? mempool_free+0x130/0x130 [ 691.011146][T24266] mempool_alloc+0x9d/0x310 [ 691.016625][T24266] ? common_interrupt+0xac/0xc0 [ 691.021488][T24266] bio_alloc_bioset+0xcc/0x560 [ 691.026287][T24266] ? submit_bh_wbc+0x71/0x320 [ 691.030963][T24266] submit_bh_wbc+0x133/0x320 [ 691.035585][T24266] __bread_gfp+0x110/0x220 [ 691.040072][T24266] fat_ent_bread+0xc5/0x160 [ 691.044572][T24266] ? fat32_ent_set_ptr+0x70/0x70 [ 691.049641][T24266] fat_alloc_clusters+0x411/0xab0 [ 691.054676][T24266] ? debug_smp_processor_id+0x18/0x20 [ 691.060090][T24266] fat_get_block+0x267/0x610 [ 691.064683][T24266] __block_write_begin_int+0x4c5/0x1010 [ 691.070272][T24266] ? fat_block_truncate_page+0x30/0x30 [ 691.075801][T24266] cont_write_begin+0x4cf/0x7b0 [ 691.080649][T24266] fat_write_begin+0x61/0xf0 [ 691.085235][T24266] ? fat_block_truncate_page+0x30/0x30 [ 691.090716][T24266] generic_perform_write+0x1c8/0x400 [ 691.096046][T24266] __generic_file_write_iter+0x195/0x2b0 [ 691.101714][T24266] ? generic_write_checks+0x250/0x290 [ 691.107092][T24266] generic_file_write_iter+0x75/0x130 [ 691.112467][T24266] do_iter_readv_writev+0x2de/0x380 [ 691.117728][T24266] do_iter_write+0x192/0x5c0 [ 691.122468][T24266] ? splice_from_pipe_next+0x34f/0x3b0 [ 691.128008][T24266] ? kmalloc_array+0x2d/0x40 [ 691.132671][T24266] vfs_iter_write+0x4c/0x70 [ 691.137293][T24266] iter_file_splice_write+0x43a/0x790 [ 691.142675][T24266] ? splice_from_pipe+0xd0/0xd0 [ 691.147534][T24266] direct_splice_actor+0x80/0xa0 [ 691.152593][T24266] splice_direct_to_actor+0x345/0x650 [ 691.158095][T24266] ? do_splice_direct+0x190/0x190 [ 691.163123][T24266] do_splice_direct+0x106/0x190 [ 691.168003][T24266] do_sendfile+0x675/0xc40 [ 691.172418][T24266] __x64_sys_sendfile64+0x102/0x140 [ 691.177615][T24266] do_syscall_64+0x44/0xd0 [ 691.182030][T24266] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 691.188050][T24266] RIP: 0033:0x7fe1cb921ae9 [ 691.192507][T24266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 691.212199][T24266] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 691.220702][T24266] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 691.228708][T24266] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 691.236698][T24266] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 691.244665][T24266] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 691.252625][T24266] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 691.260609][T24266] 11:03:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000011) 11:03:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:08 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x9, r4, r2, 0x0) 11:03:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009c) 11:03:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008d00) 11:03:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 6) 11:03:08 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0xa, r4, r2, 0x0) 11:03:08 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0xb, r4, r2, 0x0) [ 691.465902][T24275] loop0: detected capacity change from 0 to 262160 [ 691.466873][T24276] loop5: detected capacity change from 0 to 262160 [ 691.472839][T24277] loop3: detected capacity change from 0 to 262160 [ 691.488768][T24278] loop1: detected capacity change from 0 to 262160 [ 691.501468][T24277] FAULT_INJECTION: forcing a failure. [ 691.501468][T24277] name failslab, interval 1, probability 0, space 0, times 0 11:03:08 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0xc, r4, r2, 0x0) 11:03:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009d) 11:03:08 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0xd, r4, r2, 0x0) [ 691.514110][T24277] CPU: 1 PID: 24277 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 691.522880][T24277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.532965][T24277] Call Trace: [ 691.536243][T24277] [ 691.539174][T24277] dump_stack_lvl+0xd6/0x122 [ 691.543803][T24277] dump_stack+0x11/0x1b [ 691.548037][T24277] should_fail+0x23c/0x250 [ 691.552452][T24277] ? fat_cache_add+0x1f7/0x4f0 [ 691.557257][T24277] __should_failslab+0x81/0x90 [ 691.562044][T24277] should_failslab+0x5/0x20 11:03:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffff000) [ 691.566576][T24277] kmem_cache_alloc+0x4f/0x320 [ 691.571437][T24277] fat_cache_add+0x1f7/0x4f0 [ 691.576033][T24277] fat_get_cluster+0x5ca/0x890 [ 691.580935][T24277] fat_get_mapped_cluster+0xe0/0x260 [ 691.586232][T24277] fat_bmap+0x258/0x290 [ 691.590452][T24277] fat_get_block+0x3cb/0x610 [ 691.595264][T24277] __block_write_begin_int+0x4c5/0x1010 [ 691.600890][T24277] ? fat_block_truncate_page+0x30/0x30 [ 691.606403][T24277] cont_write_begin+0x4cf/0x7b0 [ 691.611390][T24277] fat_write_begin+0x61/0xf0 [ 691.615970][T24277] ? fat_block_truncate_page+0x30/0x30 [ 691.621488][T24277] generic_perform_write+0x1c8/0x400 [ 691.626926][T24277] __generic_file_write_iter+0x195/0x2b0 [ 691.632570][T24277] ? generic_write_checks+0x250/0x290 [ 691.637957][T24277] generic_file_write_iter+0x75/0x130 [ 691.643378][T24277] do_iter_readv_writev+0x2de/0x380 [ 691.648565][T24277] do_iter_write+0x192/0x5c0 [ 691.653171][T24277] ? splice_from_pipe_next+0x34f/0x3b0 [ 691.658614][T24277] ? kmalloc_array+0x2d/0x40 [ 691.663189][T24277] vfs_iter_write+0x4c/0x70 [ 691.667725][T24277] iter_file_splice_write+0x43a/0x790 [ 691.673172][T24277] ? splice_from_pipe+0xd0/0xd0 [ 691.678010][T24277] direct_splice_actor+0x80/0xa0 [ 691.682934][T24277] splice_direct_to_actor+0x345/0x650 [ 691.688354][T24277] ? do_splice_direct+0x190/0x190 [ 691.693489][T24277] do_splice_direct+0x106/0x190 [ 691.698326][T24277] do_sendfile+0x675/0xc40 [ 691.702723][T24277] __x64_sys_sendfile64+0x102/0x140 [ 691.707952][T24277] do_syscall_64+0x44/0xd0 [ 691.712350][T24277] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 691.718341][T24277] RIP: 0033:0x7fe1cb921ae9 [ 691.722737][T24277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 691.742461][T24277] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 691.750859][T24277] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 691.758856][T24277] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 691.766842][T24277] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 691.774794][T24277] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 691.782764][T24277] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 691.790714][T24277] [ 691.822185][T24294] loop5: detected capacity change from 0 to 262160 [ 691.840879][T24298] loop1: detected capacity change from 0 to 262160 11:03:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000083) 11:03:08 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0xe, r4, r2, 0x0) 11:03:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008e00) 11:03:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 7) 11:03:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009e) 11:03:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000002) 11:03:08 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0xf, r4, r2, 0x0) [ 692.085721][T24308] loop3: detected capacity change from 0 to 262160 [ 692.089787][T24311] loop5: detected capacity change from 0 to 262160 [ 692.092697][T24310] loop1: detected capacity change from 0 to 262160 [ 692.100009][T24312] loop0: detected capacity change from 0 to 262160 [ 692.122407][T24308] FAULT_INJECTION: forcing a failure. [ 692.122407][T24308] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 692.135721][T24308] CPU: 0 PID: 24308 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 692.144483][T24308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.154542][T24308] Call Trace: [ 692.157838][T24308] [ 692.160771][T24308] dump_stack_lvl+0xd6/0x122 [ 692.165445][T24308] dump_stack+0x11/0x1b [ 692.169608][T24308] should_fail+0x23c/0x250 [ 692.175083][T24308] __alloc_pages+0x102/0x330 [ 692.179854][T24308] alloc_pages+0x382/0x3d0 [ 692.184266][T24308] folio_alloc+0x1a/0x20 [ 692.188504][T24308] filemap_alloc_folio+0x53/0xf0 [ 692.193483][T24308] __filemap_get_folio+0x443/0x690 [ 692.198625][T24308] pagecache_get_page+0x26/0xe0 [ 692.203595][T24308] grab_cache_page_write_begin+0x3f/0x50 [ 692.209387][T24308] cont_write_begin+0x4ab/0x7b0 [ 692.214262][T24308] fat_write_begin+0x61/0xf0 [ 692.218849][T24308] ? fat_block_truncate_page+0x30/0x30 [ 692.224307][T24308] generic_perform_write+0x1c8/0x400 [ 692.229602][T24308] ? fat_write_begin+0xf0/0xf0 [ 692.234398][T24308] __generic_file_write_iter+0x195/0x2b0 [ 692.240093][T24308] ? generic_write_checks+0x250/0x290 [ 692.245555][T24308] generic_file_write_iter+0x75/0x130 [ 692.251062][T24308] do_iter_readv_writev+0x2de/0x380 [ 692.256270][T24308] do_iter_write+0x192/0x5c0 [ 692.260865][T24308] ? splice_from_pipe_next+0x34f/0x3b0 [ 692.266363][T24308] ? kmalloc_array+0x2d/0x40 [ 692.270958][T24308] vfs_iter_write+0x4c/0x70 [ 692.275646][T24308] iter_file_splice_write+0x43a/0x790 [ 692.281289][T24308] ? splice_from_pipe+0xd0/0xd0 [ 692.286150][T24308] direct_splice_actor+0x80/0xa0 [ 692.291089][T24308] splice_direct_to_actor+0x345/0x650 [ 692.296489][T24308] ? do_splice_direct+0x190/0x190 [ 692.301516][T24308] do_splice_direct+0x106/0x190 [ 692.306411][T24308] do_sendfile+0x675/0xc40 [ 692.311011][T24308] __x64_sys_sendfile64+0x102/0x140 [ 692.316214][T24308] do_syscall_64+0x44/0xd0 [ 692.320633][T24308] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 692.326531][T24308] RIP: 0033:0x7fe1cb921ae9 [ 692.330974][T24308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 692.350644][T24308] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 692.359432][T24308] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 692.367413][T24308] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 692.375387][T24308] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 11:03:09 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x10, r4, r2, 0x0) 11:03:09 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x11, r4, r2, 0x0) 11:03:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009f) 11:03:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000003) 11:03:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008f00) [ 692.383360][T24308] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 692.391353][T24308] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 692.399384][T24308] [ 692.469745][T24330] loop5: detected capacity change from 0 to 262160 [ 692.487172][T24333] loop0: detected capacity change from 0 to 262160 [ 692.501078][T24334] loop1: detected capacity change from 0 to 262160 11:03:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000da) 11:03:09 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x12, r4, r2, 0x0) 11:03:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 8) 11:03:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a0) 11:03:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009000) 11:03:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000004) 11:03:09 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x13, r4, r2, 0x0) 11:03:09 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x14, r4, r2, 0x0) [ 692.733579][T24342] loop3: detected capacity change from 0 to 262160 [ 692.740619][T24347] loop5: detected capacity change from 0 to 262160 [ 692.742157][T24348] loop0: detected capacity change from 0 to 262160 [ 692.754323][T24346] loop1: detected capacity change from 0 to 262160 [ 692.777825][T24342] FAULT_INJECTION: forcing a failure. [ 692.777825][T24342] name failslab, interval 1, probability 0, space 0, times 0 [ 692.790462][T24342] CPU: 0 PID: 24342 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 692.799231][T24342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.809284][T24342] Call Trace: [ 692.812561][T24342] [ 692.815484][T24342] dump_stack_lvl+0xd6/0x122 [ 692.820157][T24342] dump_stack+0x11/0x1b [ 692.824337][T24342] should_fail+0x23c/0x250 [ 692.828778][T24342] ? xas_create+0x3fb/0xb10 [ 692.833296][T24342] __should_failslab+0x81/0x90 [ 692.838189][T24342] should_failslab+0x5/0x20 [ 692.842733][T24342] kmem_cache_alloc+0x4f/0x320 [ 692.847601][T24342] xas_create+0x3fb/0xb10 [ 692.851985][T24342] xas_store+0x70/0xca0 [ 692.856154][T24342] ? xas_find_conflict+0x422/0x4c0 [ 692.861264][T24342] __filemap_add_folio+0x1e8/0x4d0 [ 692.866381][T24342] ? workingset_activation+0x2b0/0x2b0 [ 692.871836][T24342] filemap_add_folio+0x6b/0x150 [ 692.876684][T24342] __filemap_get_folio+0x4c4/0x690 [ 692.881877][T24342] pagecache_get_page+0x26/0xe0 [ 692.886730][T24342] grab_cache_page_write_begin+0x3f/0x50 [ 692.892380][T24342] cont_write_begin+0x4ab/0x7b0 [ 692.897245][T24342] fat_write_begin+0x61/0xf0 [ 692.901836][T24342] ? fat_block_truncate_page+0x30/0x30 [ 692.907296][T24342] generic_perform_write+0x1c8/0x400 [ 692.912582][T24342] ? fat_write_begin+0xf0/0xf0 [ 692.917413][T24342] __generic_file_write_iter+0x195/0x2b0 [ 692.923135][T24342] ? generic_write_checks+0x250/0x290 [ 692.928552][T24342] generic_file_write_iter+0x75/0x130 [ 692.933992][T24342] do_iter_readv_writev+0x2de/0x380 [ 692.939297][T24342] do_iter_write+0x192/0x5c0 [ 692.943894][T24342] ? splice_from_pipe_next+0x34f/0x3b0 [ 692.949353][T24342] ? kmalloc_array+0x2d/0x40 [ 692.954080][T24342] vfs_iter_write+0x4c/0x70 [ 692.958677][T24342] iter_file_splice_write+0x43a/0x790 [ 692.964058][T24342] ? splice_from_pipe+0xd0/0xd0 [ 692.968967][T24342] direct_splice_actor+0x80/0xa0 [ 692.973922][T24342] splice_direct_to_actor+0x345/0x650 [ 692.979333][T24342] ? do_splice_direct+0x190/0x190 [ 692.984819][T24342] do_splice_direct+0x106/0x190 [ 692.989684][T24342] do_sendfile+0x675/0xc40 [ 692.994219][T24342] __x64_sys_sendfile64+0x102/0x140 [ 692.999475][T24342] do_syscall_64+0x44/0xd0 [ 693.003904][T24342] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 693.009807][T24342] RIP: 0033:0x7fe1cb921ae9 [ 693.014221][T24342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 693.034001][T24342] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 693.042978][T24342] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 693.051030][T24342] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 693.059156][T24342] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 693.067233][T24342] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 693.075210][T24342] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 11:03:09 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x15, r4, r2, 0x0) 11:03:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009100) [ 693.083325][T24342] 11:03:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a1) 11:03:09 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x18, r4, r2, 0x0) [ 693.162905][T24367] loop0: detected capacity change from 0 to 262160 [ 693.182769][T24371] loop5: detected capacity change from 0 to 262160 11:03:10 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000201) 11:03:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 9) 11:03:10 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x19, r4, r2, 0x0) 11:03:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009200) 11:03:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a2) 11:03:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000005) 11:03:10 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x1a, r4, r2, 0x0) [ 693.420381][T24384] loop1: detected capacity change from 0 to 262160 [ 693.420423][T24385] loop5: detected capacity change from 0 to 262160 [ 693.427960][T24386] loop3: detected capacity change from 0 to 262160 [ 693.435231][T24387] loop0: detected capacity change from 0 to 262160 [ 693.464162][T24386] FAULT_INJECTION: forcing a failure. [ 693.464162][T24386] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 693.477565][T24386] CPU: 1 PID: 24386 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 693.486357][T24386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.496450][T24386] Call Trace: [ 693.499728][T24386] [ 693.502662][T24386] dump_stack_lvl+0xd6/0x122 [ 693.507386][T24386] dump_stack+0x11/0x1b [ 693.511544][T24386] should_fail+0x23c/0x250 [ 693.515963][T24386] __alloc_pages+0x102/0x330 11:03:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a3) [ 693.520563][T24386] alloc_pages+0x382/0x3d0 [ 693.525028][T24386] folio_alloc+0x1a/0x20 [ 693.529305][T24386] filemap_alloc_folio+0x53/0xf0 [ 693.534289][T24386] __filemap_get_folio+0x443/0x690 [ 693.539418][T24386] pagecache_get_page+0x26/0xe0 [ 693.544281][T24386] grab_cache_page_write_begin+0x3f/0x50 [ 693.550146][T24386] cont_write_begin+0x4ab/0x7b0 [ 693.555108][T24386] fat_write_begin+0x61/0xf0 [ 693.559775][T24386] ? fat_block_truncate_page+0x30/0x30 [ 693.565298][T24386] generic_perform_write+0x1c8/0x400 [ 693.570602][T24386] ? fat_write_begin+0xf0/0xf0 [ 693.575425][T24386] __generic_file_write_iter+0x195/0x2b0 [ 693.581482][T24386] ? generic_write_checks+0x250/0x290 [ 693.586852][T24386] generic_file_write_iter+0x75/0x130 [ 693.592301][T24386] do_iter_readv_writev+0x2de/0x380 [ 693.597687][T24386] do_iter_write+0x192/0x5c0 [ 693.602421][T24386] ? splice_from_pipe_next+0x34f/0x3b0 [ 693.607934][T24386] ? kmalloc_array+0x2d/0x40 [ 693.612533][T24386] vfs_iter_write+0x4c/0x70 [ 693.617078][T24386] iter_file_splice_write+0x43a/0x790 [ 693.622461][T24386] ? splice_from_pipe+0xd0/0xd0 [ 693.627308][T24386] direct_splice_actor+0x80/0xa0 [ 693.632252][T24386] splice_direct_to_actor+0x345/0x650 [ 693.637623][T24386] ? do_splice_direct+0x190/0x190 [ 693.642654][T24386] do_splice_direct+0x106/0x190 [ 693.647538][T24386] do_sendfile+0x675/0xc40 [ 693.651959][T24386] __x64_sys_sendfile64+0x102/0x140 [ 693.657184][T24386] do_syscall_64+0x44/0xd0 [ 693.661603][T24386] entry_SYSCALL_64_after_hwframe+0x44/0xae 11:03:10 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x1b, r4, r2, 0x0) [ 693.667501][T24386] RIP: 0033:0x7fe1cb921ae9 [ 693.671911][T24386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 693.691695][T24386] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 693.700116][T24386] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 693.708142][T24386] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 11:03:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000006) 11:03:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009300) 11:03:10 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x1c, r4, r2, 0x0) [ 693.716110][T24386] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 693.724106][T24386] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 693.732073][T24386] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 693.740107][T24386] [ 693.803985][T24406] loop5: detected capacity change from 0 to 262160 [ 693.818830][T24408] loop1: detected capacity change from 0 to 262160 [ 693.829703][T24410] loop0: detected capacity change from 0 to 262160 11:03:10 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000281) 11:03:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 10) 11:03:10 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x1d, r4, r2, 0x0) 11:03:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a4) 11:03:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000007) 11:03:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009400) 11:03:10 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x1e, r4, r2, 0x0) [ 694.104281][T24419] loop3: detected capacity change from 0 to 262160 [ 694.113927][T24424] loop0: detected capacity change from 0 to 262160 [ 694.120459][T24417] loop1: detected capacity change from 0 to 262160 [ 694.120989][T24425] loop5: detected capacity change from 0 to 262160 [ 694.130352][T24419] FAULT_INJECTION: forcing a failure. [ 694.130352][T24419] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 694.146992][T24419] CPU: 0 PID: 24419 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 694.155893][T24419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.165949][T24419] Call Trace: [ 694.169228][T24419] [ 694.172153][T24419] dump_stack_lvl+0xd6/0x122 [ 694.176793][T24419] dump_stack+0x11/0x1b [ 694.180954][T24419] should_fail+0x23c/0x250 [ 694.185439][T24419] __alloc_pages+0x102/0x330 [ 694.190131][T24419] alloc_pages+0x382/0x3d0 [ 694.194661][T24419] folio_alloc+0x1a/0x20 [ 694.198914][T24419] filemap_alloc_folio+0x53/0xf0 [ 694.203864][T24419] __filemap_get_folio+0x443/0x690 [ 694.209435][T24419] pagecache_get_page+0x26/0xe0 [ 694.214298][T24419] grab_cache_page_write_begin+0x3f/0x50 [ 694.220073][T24419] cont_write_begin+0x4ab/0x7b0 [ 694.224969][T24419] fat_write_begin+0x61/0xf0 [ 694.229622][T24419] ? fat_block_truncate_page+0x30/0x30 [ 694.235172][T24419] generic_perform_write+0x1c8/0x400 [ 694.240468][T24419] ? fat_write_begin+0xf0/0xf0 [ 694.245268][T24419] __generic_file_write_iter+0x195/0x2b0 [ 694.250937][T24419] ? generic_write_checks+0x250/0x290 [ 694.256313][T24419] generic_file_write_iter+0x75/0x130 [ 694.261750][T24419] do_iter_readv_writev+0x2de/0x380 [ 694.266961][T24419] do_iter_write+0x192/0x5c0 [ 694.271561][T24419] ? splice_from_pipe_next+0x34f/0x3b0 [ 694.277119][T24419] ? kmalloc_array+0x2d/0x40 [ 694.281730][T24419] vfs_iter_write+0x4c/0x70 [ 694.286246][T24419] iter_file_splice_write+0x43a/0x790 [ 694.291640][T24419] ? splice_from_pipe+0xd0/0xd0 [ 694.296499][T24419] direct_splice_actor+0x80/0xa0 [ 694.301450][T24419] splice_direct_to_actor+0x345/0x650 [ 694.306886][T24419] ? do_splice_direct+0x190/0x190 [ 694.311919][T24419] do_splice_direct+0x106/0x190 [ 694.316780][T24419] do_sendfile+0x675/0xc40 [ 694.321252][T24419] __x64_sys_sendfile64+0x102/0x140 [ 694.326563][T24419] do_syscall_64+0x44/0xd0 [ 694.330974][T24419] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 694.336969][T24419] RIP: 0033:0x7fe1cb921ae9 [ 694.341380][T24419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 694.361249][T24419] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 694.369678][T24419] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 694.377659][T24419] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 694.385623][T24419] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 694.393774][T24419] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 11:03:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009500) 11:03:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000008) [ 694.401827][T24419] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 694.409803][T24419] 11:03:11 executing program 2: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r3 = request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='keyring\x00', 0xfffffffffffffffc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f00000004c0)={[{@fat=@gid={'gid', 0x3d, r5}}]}) keyctl$chown(0x4, r3, 0xee00, r5) r6 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r6, r2, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getnetconf={0x1c, 0x52, 0x100, 0x7ff, 0x25dfdbfc, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000800}, 0x880) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r7, 0x1c243911) keyctl$chown(0x4, r7, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r7, 0xffffffffffffffff, r8) keyctl$get_security(0x11, r7, 0x0, 0x0) keyctl$revoke(0x3, r7) 11:03:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 11) [ 694.491591][T24437] loop1: detected capacity change from 0 to 262160 [ 694.507064][T24439] loop0: detected capacity change from 0 to 262160 [ 694.522229][T24443] loop3: detected capacity change from 0 to 262160 11:03:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000009) [ 694.538202][T24443] FAULT_INJECTION: forcing a failure. [ 694.538202][T24443] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 694.551733][T24443] CPU: 1 PID: 24443 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 694.560528][T24443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.570574][T24443] Call Trace: [ 694.573882][T24443] [ 694.576794][T24443] dump_stack_lvl+0xd6/0x122 [ 694.581389][T24443] dump_stack+0x11/0x1b [ 694.585526][T24443] should_fail+0x23c/0x250 [ 694.589983][T24443] __alloc_pages+0x102/0x330 [ 694.594603][T24443] alloc_pages+0x382/0x3d0 [ 694.599121][T24443] folio_alloc+0x1a/0x20 [ 694.603355][T24443] filemap_alloc_folio+0x53/0xf0 [ 694.608274][T24443] __filemap_get_folio+0x443/0x690 [ 694.613374][T24443] pagecache_get_page+0x26/0xe0 [ 694.618207][T24443] grab_cache_page_write_begin+0x3f/0x50 [ 694.623820][T24443] cont_write_begin+0x4ab/0x7b0 [ 694.628682][T24443] fat_write_begin+0x61/0xf0 [ 694.633350][T24443] ? fat_block_truncate_page+0x30/0x30 [ 694.638791][T24443] generic_perform_write+0x1c8/0x400 [ 694.644193][T24443] ? fat_write_begin+0xf0/0xf0 [ 694.648975][T24443] __generic_file_write_iter+0x195/0x2b0 [ 694.654620][T24443] ? generic_write_checks+0x250/0x290 [ 694.659991][T24443] generic_file_write_iter+0x75/0x130 [ 694.665348][T24443] do_iter_readv_writev+0x2de/0x380 [ 694.670597][T24443] do_iter_write+0x192/0x5c0 [ 694.675238][T24443] ? splice_from_pipe_next+0x34f/0x3b0 [ 694.680754][T24443] ? kmalloc_array+0x2d/0x40 [ 694.685330][T24443] vfs_iter_write+0x4c/0x70 [ 694.689898][T24443] iter_file_splice_write+0x43a/0x790 [ 694.695308][T24443] ? splice_from_pipe+0xd0/0xd0 [ 694.700260][T24443] direct_splice_actor+0x80/0xa0 [ 694.705192][T24443] splice_direct_to_actor+0x345/0x650 [ 694.710997][T24443] ? do_splice_direct+0x190/0x190 [ 694.716060][T24443] do_splice_direct+0x106/0x190 [ 694.720958][T24443] do_sendfile+0x675/0xc40 [ 694.725365][T24443] __x64_sys_sendfile64+0x102/0x140 [ 694.730555][T24443] do_syscall_64+0x44/0xd0 [ 694.734954][T24443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 694.740834][T24443] RIP: 0033:0x7fe1cb921ae9 [ 694.745228][T24443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 694.764851][T24443] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 694.773437][T24443] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 694.781491][T24443] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 694.789448][T24443] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 694.797408][T24443] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 694.805364][T24443] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 694.813334][T24443] [ 694.851373][T24447] loop1: detected capacity change from 0 to 262160 11:03:11 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000301) 11:03:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009600) 11:03:11 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x1c243911) keyctl$chown(0x4, r4, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r4, 0xffffffffffffffff, r5) keyctl$get_security(0x11, r4, 0x0, 0x0) add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r4) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r7 = dup2(r6, r6) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r7, 0xc0182101, &(0x7f00000001c0)={r8}) sendmsg$nl_route_sched(r7, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@delchain={0x78, 0x65, 0x20, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xd, 0x8}, {0x4, 0xffe0}, {0x5, 0x4}}, [@TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_u32={{0x8}, {0x34, 0x2, [@TCA_U32_POLICE={0x10, 0x6, [@TCA_POLICE_RATE64={0xc, 0x8, 0xbc}]}, @TCA_U32_LINK={0x8, 0x3, 0x1f}, @TCA_U32_DIVISOR={0x8, 0x4, 0xcf}, @TCA_U32_FLAGS={0x8, 0xb, 0x8}, @TCA_U32_CLASSID={0x8, 0x1, {0xd, 0x10}}]}}, @TCA_CHAIN={0x8, 0xb, 0x2}, @TCA_CHAIN={0x8, 0xb, 0x1}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008000}, 0x80) r9 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r9, r2, 0x0) 11:03:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 12) 11:03:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) 11:03:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a5) [ 695.044039][T24452] loop1: detected capacity change from 0 to 262160 [ 695.052606][T24458] loop3: detected capacity change from 0 to 262160 [ 695.053285][T24459] loop0: detected capacity change from 0 to 262160 [ 695.059638][T24456] loop5: detected capacity change from 0 to 262160 [ 695.076826][T24458] FAULT_INJECTION: forcing a failure. [ 695.076826][T24458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 11:03:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a6) 11:03:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009700) 11:03:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000b) [ 695.090422][T24458] CPU: 1 PID: 24458 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 695.099198][T24458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.109858][T24458] Call Trace: [ 695.113165][T24458] [ 695.116098][T24458] dump_stack_lvl+0xd6/0x122 [ 695.120698][T24458] dump_stack+0x11/0x1b [ 695.124861][T24458] should_fail+0x23c/0x250 [ 695.129283][T24458] __alloc_pages+0x102/0x330 [ 695.133918][T24458] alloc_pages+0x382/0x3d0 [ 695.138333][T24458] folio_alloc+0x1a/0x20 [ 695.142621][T24458] filemap_alloc_folio+0x53/0xf0 [ 695.147547][T24458] __filemap_get_folio+0x443/0x690 [ 695.152909][T24458] pagecache_get_page+0x26/0xe0 [ 695.157746][T24458] grab_cache_page_write_begin+0x3f/0x50 [ 695.163393][T24458] cont_write_begin+0x4ab/0x7b0 [ 695.168225][T24458] fat_write_begin+0x61/0xf0 [ 695.172797][T24458] ? fat_block_truncate_page+0x30/0x30 [ 695.178423][T24458] generic_perform_write+0x1c8/0x400 [ 695.183747][T24458] ? fat_write_begin+0xf0/0xf0 [ 695.188612][T24458] __generic_file_write_iter+0x195/0x2b0 [ 695.194365][T24458] ? generic_write_checks+0x250/0x290 [ 695.199782][T24458] generic_file_write_iter+0x75/0x130 [ 695.205182][T24458] do_iter_readv_writev+0x2de/0x380 [ 695.210724][T24458] do_iter_write+0x192/0x5c0 [ 695.215425][T24458] ? splice_from_pipe_next+0x34f/0x3b0 [ 695.220899][T24458] ? kmalloc_array+0x2d/0x40 [ 695.225656][T24458] vfs_iter_write+0x4c/0x70 [ 695.230294][T24458] iter_file_splice_write+0x43a/0x790 [ 695.235737][T24458] ? splice_from_pipe+0xd0/0xd0 [ 695.240713][T24458] direct_splice_actor+0x80/0xa0 [ 695.245627][T24458] splice_direct_to_actor+0x345/0x650 [ 695.251156][T24458] ? do_splice_direct+0x190/0x190 [ 695.256228][T24458] do_splice_direct+0x106/0x190 [ 695.261206][T24458] do_sendfile+0x675/0xc40 [ 695.265606][T24458] __x64_sys_sendfile64+0x102/0x140 [ 695.270785][T24458] do_syscall_64+0x44/0xd0 [ 695.275182][T24458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 695.281105][T24458] RIP: 0033:0x7fe1cb921ae9 [ 695.285497][T24458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 695.305097][T24458] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 695.313506][T24458] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 695.321526][T24458] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 695.329527][T24458] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 695.337488][T24458] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 11:03:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 13) [ 695.345495][T24458] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 695.353531][T24458] [ 695.395803][T24467] loop1: detected capacity change from 0 to 262160 [ 695.396802][T24468] loop5: detected capacity change from 0 to 262160 [ 695.402811][T24469] loop0: detected capacity change from 0 to 262160 11:03:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000c) 11:03:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a7) [ 695.451789][T24473] loop3: detected capacity change from 0 to 262160 [ 695.473259][T24473] FAULT_INJECTION: forcing a failure. [ 695.473259][T24473] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 695.486696][T24473] CPU: 1 PID: 24473 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 695.495579][T24473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.505701][T24473] Call Trace: [ 695.508971][T24473] [ 695.511898][T24473] dump_stack_lvl+0xd6/0x122 [ 695.516575][T24473] dump_stack+0x11/0x1b [ 695.520826][T24473] should_fail+0x23c/0x250 [ 695.525245][T24473] __alloc_pages+0x102/0x330 [ 695.529881][T24473] alloc_pages+0x382/0x3d0 [ 695.534293][T24473] folio_alloc+0x1a/0x20 [ 695.538528][T24473] filemap_alloc_folio+0x53/0xf0 [ 695.543508][T24473] __filemap_get_folio+0x443/0x690 [ 695.548776][T24473] pagecache_get_page+0x26/0xe0 [ 695.553707][T24473] grab_cache_page_write_begin+0x3f/0x50 [ 695.559344][T24473] cont_write_begin+0x4ab/0x7b0 [ 695.564239][T24473] fat_write_begin+0x61/0xf0 [ 695.568900][T24473] ? fat_block_truncate_page+0x30/0x30 [ 695.574362][T24473] generic_perform_write+0x1c8/0x400 [ 695.574833][T24478] loop1: detected capacity change from 0 to 262160 [ 695.579743][T24473] ? fat_write_begin+0xf0/0xf0 [ 695.579772][T24473] __generic_file_write_iter+0x195/0x2b0 [ 695.596626][T24473] ? generic_write_checks+0x250/0x290 [ 695.602014][T24473] generic_file_write_iter+0x75/0x130 [ 695.607446][T24473] do_iter_readv_writev+0x2de/0x380 [ 695.612652][T24473] do_iter_write+0x192/0x5c0 [ 695.617699][T24473] ? splice_from_pipe_next+0x34f/0x3b0 [ 695.623167][T24473] ? kmalloc_array+0x2d/0x40 [ 695.627762][T24473] vfs_iter_write+0x4c/0x70 [ 695.632276][T24473] iter_file_splice_write+0x43a/0x790 [ 695.637662][T24473] ? splice_from_pipe+0xd0/0xd0 [ 695.642523][T24473] direct_splice_actor+0x80/0xa0 [ 695.647532][T24473] splice_direct_to_actor+0x345/0x650 [ 695.653027][T24473] ? do_splice_direct+0x190/0x190 [ 695.658127][T24473] do_splice_direct+0x106/0x190 [ 695.663071][T24473] do_sendfile+0x675/0xc40 [ 695.667495][T24473] __x64_sys_sendfile64+0x102/0x140 [ 695.672755][T24473] do_syscall_64+0x44/0xd0 [ 695.677219][T24473] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 695.683150][T24473] RIP: 0033:0x7fe1cb921ae9 [ 695.687562][T24473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 695.707253][T24473] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 695.715677][T24473] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 695.723642][T24473] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 695.731607][T24473] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 695.739662][T24473] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 695.747626][T24473] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 695.755600][T24473] [ 695.812515][T24481] loop5: detected capacity change from 0 to 262160 [ 695.885907][ T24] kauditd_printk_skb: 1593 callbacks suppressed [ 695.885919][ T24] audit: type=1326 audit(1638788592.699:1060973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24453 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 695.916485][ T24] audit: type=1326 audit(1638788592.699:1060974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24453 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=33 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 695.940647][ T24] audit: type=1326 audit(1638788592.699:1060975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24453 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 695.964918][ T24] audit: type=1326 audit(1638788592.699:1060976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24453 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 695.989247][ T24] audit: type=1326 audit(1638788592.699:1060977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24453 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 696.013674][ T24] audit: type=1326 audit(1638788592.699:1060978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24453 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 696.038005][ T24] audit: type=1326 audit(1638788592.699:1060979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24453 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 696.062381][ T24] audit: type=1326 audit(1638788592.699:1060980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24453 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=115 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 696.086732][ T24] audit: type=1326 audit(1638788592.699:1060981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24453 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 696.111049][ T24] audit: type=1326 audit(1638788592.699:1060982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24453 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:12 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000500) 11:03:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009800) 11:03:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000d) 11:03:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 14) 11:03:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a8) 11:03:12 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xfffffe3f) setsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f0000000040), 0x4) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) 11:03:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r4) r5 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r1) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r0, 0x0) request_key(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='\x00', r0) keyctl$chown(0x4, r5, r3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000000100), &(0x7f0000000180)=0x80) [ 696.184342][T24487] loop5: detected capacity change from 0 to 262160 [ 696.187241][T24490] loop0: detected capacity change from 0 to 262160 [ 696.194812][T24492] loop3: detected capacity change from 0 to 262160 [ 696.198051][T24491] loop1: detected capacity change from 0 to 262160 [ 696.218499][T24492] FAULT_INJECTION: forcing a failure. [ 696.218499][T24492] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 696.231794][T24492] CPU: 1 PID: 24492 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 696.240619][T24492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.250674][T24492] Call Trace: [ 696.253946][T24492] [ 696.256929][T24492] dump_stack_lvl+0xd6/0x122 [ 696.261585][T24492] dump_stack+0x11/0x1b [ 696.265753][T24492] should_fail+0x23c/0x250 [ 696.270177][T24492] __alloc_pages+0x102/0x330 [ 696.274774][T24492] alloc_pages+0x382/0x3d0 [ 696.279192][T24492] folio_alloc+0x1a/0x20 [ 696.283515][T24492] filemap_alloc_folio+0x53/0xf0 [ 696.288458][T24492] __filemap_get_folio+0x443/0x690 [ 696.293851][T24492] pagecache_get_page+0x26/0xe0 [ 696.298861][T24492] grab_cache_page_write_begin+0x3f/0x50 [ 696.304565][T24492] cont_write_begin+0x4ab/0x7b0 [ 696.309476][T24492] fat_write_begin+0x61/0xf0 [ 696.314065][T24492] ? fat_block_truncate_page+0x30/0x30 [ 696.319727][T24492] generic_perform_write+0x1c8/0x400 [ 696.325025][T24492] ? fat_write_begin+0xf0/0xf0 11:03:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009900) [ 696.329803][T24492] __generic_file_write_iter+0x195/0x2b0 [ 696.335448][T24492] ? generic_write_checks+0x250/0x290 [ 696.340981][T24492] generic_file_write_iter+0x75/0x130 [ 696.346373][T24492] do_iter_readv_writev+0x2de/0x380 [ 696.351643][T24492] do_iter_write+0x192/0x5c0 [ 696.356278][T24492] ? splice_from_pipe_next+0x34f/0x3b0 [ 696.361846][T24492] ? kmalloc_array+0x2d/0x40 [ 696.366477][T24492] vfs_iter_write+0x4c/0x70 [ 696.371080][T24492] iter_file_splice_write+0x43a/0x790 [ 696.376510][T24492] ? splice_from_pipe+0xd0/0xd0 [ 696.381368][T24492] direct_splice_actor+0x80/0xa0 [ 696.386375][T24492] splice_direct_to_actor+0x345/0x650 [ 696.391753][T24492] ? do_splice_direct+0x190/0x190 [ 696.396822][T24492] do_splice_direct+0x106/0x190 [ 696.401666][T24492] do_sendfile+0x675/0xc40 [ 696.406080][T24492] __x64_sys_sendfile64+0x102/0x140 [ 696.411321][T24492] do_syscall_64+0x44/0xd0 [ 696.415738][T24492] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 696.421645][T24492] RIP: 0033:0x7fe1cb921ae9 11:03:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000e) [ 696.426106][T24492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 696.445706][T24492] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 696.454129][T24492] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 696.465315][T24492] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 696.473284][T24492] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 11:03:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = request_key(&(0x7f00000002c0)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='user\x00', r0) r5 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) getsockname(r1, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, &(0x7f0000000040)=0x80) r7 = add_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000400)="acf54dd83dd70a8aa0e416d2aa60adec98f5c658b16ed354dfa531d21c1a6f7ad98c2a402f987d1eb18e8b06ae239c2615767216905307a380477e91ce26ff3248c80ea556722423df5672e1755c8c9c684f8273882422f66eda02bf0b9b3bcc4aad96cc3e50dcb42f912ef5a7e00f37ca22e3c419f8af6b8fd183fc54375129d797bc5eb2140437ce65330c49997d99912fd8553cc06386629daf0b8a01e17466e93ef8c33b4d782aa5e392efa8f7ea7d660df02951429be3836446a6a78f98757b75f71d4deafc38beae", 0xcb, r4) r8 = geteuid() setresuid(r8, 0x0, 0xffffffffffffffff) sendmsg$nl_route_sched(r1, &(0x7f0000000680)={&(0x7f00000005c0), 0xc, &(0x7f0000000640)={&(0x7f0000000600)=@gettaction={0x20, 0x32, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}]}, 0x20}, 0x1, 0x0, 0x0, 0x20044040}, 0x40) getresgid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) keyctl$chown(0x4, r7, r8, r9) r10 = syz_genetlink_get_family_id$smc(&(0x7f0000000140), r1) sendmsg$SMC_PNETID_FLUSH(r6, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="06000000", @ANYRES16=r10, @ANYBLOB="00042dbd7000fddbdf25040000000900010073797a32000000000500040002000000050004000100000005000400020000000900030073797a30000000000900030073797a31000000000900010073797a31000000000500040001000000"], 0x64}, 0x1, 0x0, 0x0, 0x408c0}, 0x2400c010) keyctl$chown(0x4, r5, r2, 0x0) 11:03:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a9) 11:03:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x62, 0xca8c52e74ed442d9, 0x63, 0x62, 0x30, 0x35, 0x37, 0x30, 0x31, 0x65, 0x34, 0x32, 0x64, 0x38, 0x62, 0x65]}, &(0x7f00000001c0)={0x0, "1312c5af394c162267e3d92a4b8640233f4bc6b528a6629649b4ab5259ccb702bf4cca8adc0784e6733fde65e16d9f52770913e5a916c3bc9c7c9114a381b979", 0x37}, 0x48, r0) r5 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='\x00', r0) r6 = add_key$fscrypt_provisioning(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)={0x0, 0x0, @a}, 0x48, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r6, 0x0, &(0x7f0000000340)=@keyring={'key_or_keyring:', r4}) keyctl$chown(0x4, r5, r2, 0x0) [ 696.481260][T24492] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 696.489235][T24492] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 696.496965][T24507] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 696.497270][T24492] [ 696.520081][T24507] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 696.571661][T24516] loop0: detected capacity change from 0 to 262160 [ 696.573752][T24518] loop1: detected capacity change from 0 to 262160 [ 696.590825][T24519] loop5: detected capacity change from 0 to 262160 11:03:13 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000501) 11:03:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 15) 11:03:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'team_slave_1\x00'}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r7}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000002bc0)={'ip6gre0\x00', &(0x7f0000002b40)={'syztnl1\x00', 0x0, 0x2f, 0x3f, 0xff, 0xa07, 0x0, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7, 0x8, 0x10001, 0xac24}}) sendmmsg$inet(r6, &(0x7f0000002d80)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0x20}}, {{&(0x7f0000000180)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002f80)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="72af547546d646b5bc913090050d325d05f81f384a4ea3938e179a56780dd0a5332f74806a88424646c3fd7955ac238df54bb0bf883dffd586ca5c386d1045cb81b2fac8e56d58c27087030fb32c20b87d57cc64b577dbd1ae3723cddb0f6034276da6645020223113fd8eeabc9336b889a2daa3b3977dfb07dfe4bc4995371c0f0d11c7a28c07487534887aacc4e5a3f67a86f0e6af03cae5c825d3a780fb210b943d4956d1306344d6257e2b8556f46aa8b3f1951d9aafb845a6e2b65ef364", 0xc0}, {&(0x7f0000002e40)="e204b1eb9315201ccdd9062af0de3cee2caf663e51cc53e66c79a234487e547d3e5253938f4ca47a57cb06d9af7267eb675488be7ec27006171f4d7873277390e87c23f3ffc549b191d2965f6a074216d78908023b886aa9e562f513c46790391d16801085d8f6", 0x67}, {&(0x7f0000002ec0)="aec313dd2fda1027d67a8990bbda16f6fc39230d47639b6cdaf74e15447345c96615763677405942d6ad54218826589aa3c99ffacf79a42895f1991692f44d710ad827fe778896ee72b4b849680ed6d5883efde51d77c8b61e7876a0df7ddbdd3521e68983041e23582fcd68fae3d0b263e7e5e714c1f3be28a8d50eb799810ffa5f817598b2f5b765105770701d6625c41b79ba5d85efb31e07c685ba946ab7254e541d83e9959c0b268ef5", 0xac}, {&(0x7f0000000100)="d4e1a5f7", 0x4}], 0x5}}, {{&(0x7f00000012c0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000002a80)=[{&(0x7f0000001300)="ba742098ad721129fe9b391297559575623a7dface1626b7a8b3722bb8", 0x1d}, {&(0x7f0000001540)="7ee7c05f9cc965c00ebfc39ab767e0512360fc39f30aefe39eb815ecf1581193ea18121c31023fea0217a89ae7bdf37a9446740a205f36fa4570fec44a682aaeab37abb3c5b5db2d396e70a049583cc152503afb00c87cedd52136179e52ccc21dc44d54412e501709753fb1b1a867190b85dcd64f1d5c78209a79c813a224185224b1e6b15c35fc8eb4dbfec89daaa81dfe8cc24f6257632b08ca20152116d0bb3cda9a5c7c613483156937807d6919edea0e61526c8fc4b5f7af755136e84a7b9785cae264dbe544a81165bcce519a3824ec6034179ab3c45c", 0xda}, {&(0x7f0000001340)="21d495c7c0eb2327a7bbeb03f359cfdf76583c5bbef774ed81f5adae132e2f1a247ff6b566b4b1938e77f2a0e7b157dda01b59902903665686b0c6197e0ba7a0763dcb3db991b033f559ac132b49bdb3826313a0ecfabcfa1e53bdba9b4249190fc578edb5ce030e7ae57dda5c441a0b83781b01", 0x74}, {&(0x7f0000001640)="489c386d960b77615a600a05f35adf3d03908bf05e908872395fc47b16930b249af7ebe147997a4ce30fae5f3843cf2a79e3ab731377138699b8d5548cd38f3a29f7a2f9fa070988215693f659dc87c9c225e821c06476da65e0a2c8cb83", 0x5e}, {&(0x7f00000016c0)="1fede83892c8965838fac0e652a0863d241ac6e882d2bfd5855d55f0e0e8a6ed1478d9732e65a59c7558f474dcd883dd301e799881a5d5c49130e1a78f62782a701def737ea01eb5826cd3c34ba4a777b866bed282bbaf2a3b301334ffbd86e2f6d24d181e1237add10ac30c82be2000053ff66cfc346a9b0565f242e62a48eabfeeb70415fa54c7d1a01d87c184a82f0c475259f3aed99eaf8428b36bb09d1934318e314d87fc77ff5df703c1340727ad5c462c5aa52fc83bb12e66ef93d248f3732aa8737d79cb4af2af9329b03c26dae1edf9f0346109d78942a6ad4df08ab0ddf1e3123b5eefc467818c388654ef0425", 0xf2}, {&(0x7f00000017c0)="a853e05e17e64694d888913e12be43f77c152d31a3c08d18d763754237f65d77447a3fbf520546c228f0a4999c3b61614be561fa9eb07aa2c799022211068d4e2c2d43471e75f3009e27e635934a8162a1baf6db61ec1e8129bff58ba4a005ddb6209b1e9c5abed2acf7", 0x6a}, {&(0x7f0000001840)="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", 0x1000}, {&(0x7f0000002840)="27cf908f9fbe83efdf3300721703b7d855aaa168dd2f6bcf35c380df5d0921026ae1ae94fc67780c10b876e091402660efbd1718a558c97219930d93a67ef13ce482517c9db65a334ec9fd9a48183a2b8c94960919fc5d5e58231594aa3ab407b65c78c5bc967696b82dd9c8230ea7e0097bd74b72f7c867b870508b2eb4ce4629f9da81507574a8985f4723ba", 0x8d}, {&(0x7f0000002900)="1b20c03b4fef42a049cdafb0761715c954d816fcabbfaf8d3877ca14f4dc435d222e550da8094c55ffb8b3f3db39021933f0843ec5338109b359fe06b3af23183d5d7ae3e82c429797ec4c946fc5462e1e338fb8012a7be96253", 0x5a}, {&(0x7f0000002980)="d825b697adf048c7746460d0c476808368b2fff2e2abcf0f8ab7d24ab7ae47ec3a572a73108a6d16b77c139fee8a17a3f7b775fe16cd8af447efff4a6fde6a6ba11b2f0eca4329f0961a30ff46135069e59e69b2ff694204b0113a520adca97a72588d7f7d9cc42ebae2d4ba7f51afda6baa5f5dabdd1c1e50054277aa159f167f05f83efb7d042fea7702e6644c354d1cebe9ceb824208cf5b6a73fef204c8e8b017c56309fb5e757a42b1df161b39cee08e790ae425381b2231fe6f8a05f4d89c7caaba04a8b9d16d6d4", 0xcb}], 0xa, &(0x7f0000002c00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x43}}, @ip_retopts={{0x88, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x44, 0xa1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@rand_addr=0x64010102, 0x6}, {@loopback, 0x3}, {@multicast2, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1f80000}, {@multicast1, 0x3}, {@remote}, {@multicast1, 0x401}]}, @timestamp={0x44, 0xc, 0x76, 0x0, 0x6, [0x0, 0x1ff]}, @cipso={0x86, 0x27, 0x1, [{0x0, 0x9, "07bbf268b29243"}, {0x1, 0x7, "203a06f88a"}, {0x7, 0xe, "8f796ba7f687ba5c45dd7573"}, {0x1, 0x3, 'V'}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @dev={0xac, 0x14, 0x14, 0x2f}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x168}}], 0x3, 0x44000) 11:03:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009a00) 11:03:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000f) 11:03:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000aa) [ 696.839944][T24532] loop1: detected capacity change from 0 to 262160 [ 696.848881][T24535] loop0: detected capacity change from 0 to 262160 [ 696.856020][T24536] loop5: detected capacity change from 0 to 262160 [ 696.868391][T24537] loop3: detected capacity change from 0 to 262160 [ 696.911530][T24537] FAULT_INJECTION: forcing a failure. [ 696.911530][T24537] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 696.924805][T24537] CPU: 0 PID: 24537 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 696.933602][T24537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.943662][T24537] Call Trace: [ 696.946997][T24537] [ 696.949926][T24537] dump_stack_lvl+0xd6/0x122 [ 696.954519][T24537] dump_stack+0x11/0x1b [ 696.958699][T24537] should_fail+0x23c/0x250 [ 696.963113][T24537] __alloc_pages+0x102/0x330 [ 696.967733][T24537] alloc_pages+0x382/0x3d0 [ 696.972413][T24537] folio_alloc+0x1a/0x20 [ 696.976662][T24537] filemap_alloc_folio+0x53/0xf0 [ 696.981618][T24537] __filemap_get_folio+0x443/0x690 [ 696.986734][T24537] pagecache_get_page+0x26/0xe0 [ 696.991692][T24537] grab_cache_page_write_begin+0x3f/0x50 [ 696.997329][T24537] cont_write_begin+0x4ab/0x7b0 [ 697.002182][T24537] fat_write_begin+0x61/0xf0 [ 697.006829][T24537] ? fat_block_truncate_page+0x30/0x30 [ 697.012323][T24537] generic_perform_write+0x1c8/0x400 [ 697.017660][T24537] ? fat_write_begin+0xf0/0xf0 [ 697.022481][T24537] __generic_file_write_iter+0x195/0x2b0 [ 697.028115][T24537] ? generic_write_checks+0x250/0x290 [ 697.033535][T24537] generic_file_write_iter+0x75/0x130 [ 697.038906][T24537] do_iter_readv_writev+0x2de/0x380 [ 697.044107][T24537] do_iter_write+0x192/0x5c0 [ 697.048777][T24537] ? splice_from_pipe_next+0x34f/0x3b0 [ 697.054235][T24537] ? kmalloc_array+0x2d/0x40 [ 697.058826][T24537] vfs_iter_write+0x4c/0x70 [ 697.063335][T24537] iter_file_splice_write+0x43a/0x790 [ 697.068745][T24537] ? splice_from_pipe+0xd0/0xd0 [ 697.073596][T24537] direct_splice_actor+0x80/0xa0 [ 697.078534][T24537] splice_direct_to_actor+0x345/0x650 [ 697.084040][T24537] ? do_splice_direct+0x190/0x190 [ 697.089073][T24537] do_splice_direct+0x106/0x190 [ 697.093982][T24537] do_sendfile+0x675/0xc40 [ 697.098393][T24537] __x64_sys_sendfile64+0x102/0x140 [ 697.103665][T24537] do_syscall_64+0x44/0xd0 [ 697.108142][T24537] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 697.114037][T24537] RIP: 0033:0x7fe1cb921ae9 [ 697.118452][T24537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 697.138063][T24537] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 697.146479][T24537] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 697.154454][T24537] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 11:03:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000010) 11:03:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009b00) [ 697.162532][T24537] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 697.170520][T24537] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 697.178602][T24537] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 697.186711][T24537] 11:03:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000ab) 11:03:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 16) [ 697.235634][T24543] loop1: detected capacity change from 0 to 262160 [ 697.250136][T24545] loop0: detected capacity change from 0 to 262160 11:03:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000011) 11:03:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009c00) [ 697.313557][T24548] loop5: detected capacity change from 0 to 262160 [ 697.333527][T24550] loop3: detected capacity change from 0 to 262160 [ 697.353864][T24554] loop1: detected capacity change from 0 to 262160 [ 697.380176][T24557] loop0: detected capacity change from 0 to 262160 [ 697.410490][T24550] FAULT_INJECTION: forcing a failure. [ 697.410490][T24550] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 697.423786][T24550] CPU: 1 PID: 24550 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 697.432877][T24550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.442953][T24550] Call Trace: [ 697.446223][T24550] [ 697.449231][T24550] dump_stack_lvl+0xd6/0x122 [ 697.453831][T24550] dump_stack+0x11/0x1b [ 697.458077][T24550] should_fail+0x23c/0x250 [ 697.462497][T24550] __alloc_pages+0x102/0x330 [ 697.467081][T24550] alloc_pages+0x382/0x3d0 [ 697.471497][T24550] folio_alloc+0x1a/0x20 [ 697.475784][T24550] filemap_alloc_folio+0x53/0xf0 [ 697.480712][T24550] __filemap_get_folio+0x443/0x690 [ 697.485814][T24550] pagecache_get_page+0x26/0xe0 [ 697.490650][T24550] grab_cache_page_write_begin+0x3f/0x50 [ 697.496274][T24550] cont_write_begin+0x4ab/0x7b0 [ 697.501116][T24550] fat_write_begin+0x61/0xf0 [ 697.505814][T24550] ? fat_block_truncate_page+0x30/0x30 [ 697.511275][T24550] generic_perform_write+0x1c8/0x400 [ 697.516549][T24550] ? fat_write_begin+0xf0/0xf0 [ 697.521305][T24550] __generic_file_write_iter+0x195/0x2b0 [ 697.526929][T24550] ? generic_write_checks+0x250/0x290 [ 697.532288][T24550] generic_file_write_iter+0x75/0x130 [ 697.537710][T24550] do_iter_readv_writev+0x2de/0x380 [ 697.542918][T24550] do_iter_write+0x192/0x5c0 [ 697.547530][T24550] ? splice_from_pipe_next+0x34f/0x3b0 [ 697.552976][T24550] ? kmalloc_array+0x2d/0x40 [ 697.557558][T24550] vfs_iter_write+0x4c/0x70 [ 697.562052][T24550] iter_file_splice_write+0x43a/0x790 [ 697.567427][T24550] ? splice_from_pipe+0xd0/0xd0 [ 697.572308][T24550] direct_splice_actor+0x80/0xa0 [ 697.577235][T24550] splice_direct_to_actor+0x345/0x650 [ 697.582598][T24550] ? do_splice_direct+0x190/0x190 [ 697.587612][T24550] do_splice_direct+0x106/0x190 [ 697.592549][T24550] do_sendfile+0x675/0xc40 [ 697.596953][T24550] __x64_sys_sendfile64+0x102/0x140 [ 697.602186][T24550] do_syscall_64+0x44/0xd0 [ 697.606599][T24550] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 697.612533][T24550] RIP: 0033:0x7fe1cb921ae9 [ 697.617203][T24550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 697.636838][T24550] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 697.645259][T24550] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 697.653313][T24550] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 697.661284][T24550] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 697.669389][T24550] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 11:03:14 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000600) 11:03:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000ac) 11:03:14 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x523000, 0x0) recvfrom$l2tp(r4, &(0x7f0000000080)=""/87, 0x57, 0x82, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) keyctl$chown(0x4, 0x0, 0xee00, r3) r5 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r5, r2, 0x0) 11:03:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009d00) 11:03:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000012) 11:03:14 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x1c243911) keyctl$chown(0x4, r4, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r4, 0xffffffffffffffff, r5) keyctl$get_security(0x11, r4, 0x0, 0x0) keyctl$chown(0x4, r4, 0xee00, r3) add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r6 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x2, 0x0, @d}, 0x18, r0) keyctl$chown(0x4, r6, r2, 0x0) [ 697.677357][T24550] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 697.685331][T24550] [ 697.701847][T24563] loop5: detected capacity change from 0 to 262160 11:03:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000ad) 11:03:14 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket(0x3, 0x800, 0x4) recvmmsg(r4, &(0x7f0000002540)=[{{&(0x7f0000000040)=@ethernet={0x0, @remote}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/231, 0xe7}, 0xbd}, {{&(0x7f0000000400), 0x80, &(0x7f0000000700)=[{&(0x7f0000000980)=""/2, 0x2}, {&(0x7f00000004c0)=""/178, 0xb2}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000000580)=""/149, 0x95}, {&(0x7f0000000640)=""/187, 0xfffffffffffffd3c}], 0x5}, 0xfff}, {{&(0x7f0000000780)=@x25={0x9, @remote}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/134, 0x86}, {&(0x7f00000008c0)=""/99, 0x63}, {&(0x7f0000000940)=""/7, 0x7}, {&(0x7f0000002640)=""/151, 0x97}, {&(0x7f0000000a40)=""/244, 0xf4}, {&(0x7f0000000b40)=""/163, 0xa3}], 0x6, &(0x7f0000000c80)=""/158, 0x9e}, 0x6}, {{&(0x7f0000000d40)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000dc0)=""/63, 0x3f}, {&(0x7f0000000e00)=""/149, 0x95}, {&(0x7f0000000ec0)=""/94, 0x5e}, {&(0x7f0000000f40)}, {&(0x7f0000000f80)=""/141, 0x8d}, {&(0x7f00000001c0)=""/200, 0xc8}, {&(0x7f0000001140)=""/209, 0xd1}], 0x7, &(0x7f00000012c0)=""/146, 0x92}, 0xe2}], 0x4, 0x40, &(0x7f0000001380)={0x77359400}) keyctl$chown(0x4, 0x0, 0xee00, r3) r5 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r5, r2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000002700)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000027c0)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000002780)={&(0x7f0000002740)=@getqdisc={0x40, 0x26, 0x8, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0x3}, {0x0, 0xf}, {0xffe0, 0xffe0}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x10004000}, 0xa388a4f3ec38ed25) 11:03:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 17) 11:03:14 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r7}) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@generic={0x1, 0x2, 0x7fff}) keyctl$chown(0x4, r4, r2, 0x0) [ 697.814536][T24578] loop0: detected capacity change from 0 to 262160 [ 697.823195][T24582] loop5: detected capacity change from 0 to 262160 [ 697.831992][T24580] loop1: detected capacity change from 0 to 262160 [ 697.843769][T24587] loop3: detected capacity change from 0 to 262160 [ 697.870105][T24587] FAULT_INJECTION: forcing a failure. [ 697.870105][T24587] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 697.883629][T24587] CPU: 1 PID: 24587 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 697.892392][T24587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.902482][T24587] Call Trace: [ 697.905882][T24587] [ 697.908807][T24587] dump_stack_lvl+0xd6/0x122 [ 697.913468][T24587] dump_stack+0x11/0x1b [ 697.917659][T24587] should_fail+0x23c/0x250 [ 697.922118][T24587] __alloc_pages+0x102/0x330 [ 697.926791][T24587] alloc_pages+0x382/0x3d0 [ 697.931280][T24587] folio_alloc+0x1a/0x20 [ 697.935527][T24587] filemap_alloc_folio+0x53/0xf0 [ 697.940538][T24587] __filemap_get_folio+0x443/0x690 [ 697.945655][T24587] pagecache_get_page+0x26/0xe0 [ 697.950592][T24587] grab_cache_page_write_begin+0x3f/0x50 [ 697.956227][T24587] cont_write_begin+0x4ab/0x7b0 [ 697.961084][T24587] fat_write_begin+0x61/0xf0 [ 697.965671][T24587] ? fat_block_truncate_page+0x30/0x30 [ 697.971133][T24587] generic_perform_write+0x1c8/0x400 [ 697.976444][T24587] ? fat_write_begin+0xf0/0xf0 [ 697.981228][T24587] __generic_file_write_iter+0x195/0x2b0 [ 697.986955][T24587] ? generic_write_checks+0x250/0x290 [ 697.992430][T24587] generic_file_write_iter+0x75/0x130 [ 697.997811][T24587] do_iter_readv_writev+0x2de/0x380 [ 698.003015][T24587] do_iter_write+0x192/0x5c0 [ 698.007710][T24587] ? splice_from_pipe_next+0x34f/0x3b0 [ 698.013331][T24587] ? kmalloc_array+0x2d/0x40 [ 698.017942][T24587] vfs_iter_write+0x4c/0x70 [ 698.022460][T24587] iter_file_splice_write+0x43a/0x790 [ 698.027877][T24587] ? splice_from_pipe+0xd0/0xd0 [ 698.032906][T24587] direct_splice_actor+0x80/0xa0 [ 698.037851][T24587] splice_direct_to_actor+0x345/0x650 [ 698.043250][T24587] ? do_splice_direct+0x190/0x190 [ 698.048338][T24587] do_splice_direct+0x106/0x190 [ 698.053285][T24587] do_sendfile+0x675/0xc40 [ 698.057712][T24587] __x64_sys_sendfile64+0x102/0x140 [ 698.062909][T24587] do_syscall_64+0x44/0xd0 [ 698.067327][T24587] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 698.073225][T24587] RIP: 0033:0x7fe1cb921ae9 [ 698.077639][T24587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 698.097272][T24587] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 698.105690][T24587] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 11:03:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000013) 11:03:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000ae) [ 698.113787][T24587] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 698.121924][T24587] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 698.129901][T24587] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 698.138256][T24587] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 698.146235][T24587] [ 698.200272][T24596] loop1: detected capacity change from 0 to 262160 [ 698.203778][T24598] loop5: detected capacity change from 0 to 262160 11:03:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 18) 11:03:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009e00) 11:03:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000014) 11:03:15 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000601) 11:03:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000af) [ 698.298962][T24605] loop5: detected capacity change from 0 to 262160 [ 698.302080][T24608] loop3: detected capacity change from 0 to 262160 [ 698.305956][T24607] loop0: detected capacity change from 0 to 262160 [ 698.322730][T24608] FAULT_INJECTION: forcing a failure. [ 698.322730][T24608] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 698.336020][T24608] CPU: 1 PID: 24608 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 11:03:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000b0) 11:03:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000015) 11:03:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009f00) [ 698.344364][T24610] loop1: detected capacity change from 0 to 262160 [ 698.344805][T24608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.344817][T24608] Call Trace: [ 698.344825][T24608] [ 698.344832][T24608] dump_stack_lvl+0xd6/0x122 [ 698.344920][T24608] dump_stack+0x11/0x1b [ 698.344937][T24608] should_fail+0x23c/0x250 [ 698.380839][T24608] __alloc_pages+0x102/0x330 [ 698.385522][T24608] alloc_pages+0x382/0x3d0 [ 698.389964][T24608] folio_alloc+0x1a/0x20 [ 698.394250][T24608] filemap_alloc_folio+0x53/0xf0 [ 698.399210][T24608] __filemap_get_folio+0x443/0x690 [ 698.404396][T24608] pagecache_get_page+0x26/0xe0 [ 698.409232][T24608] grab_cache_page_write_begin+0x3f/0x50 [ 698.414848][T24608] cont_write_begin+0x4ab/0x7b0 [ 698.419689][T24608] fat_write_begin+0x61/0xf0 [ 698.424389][T24608] ? fat_block_truncate_page+0x30/0x30 [ 698.429895][T24608] generic_perform_write+0x1c8/0x400 [ 698.435193][T24608] ? fat_write_begin+0xf0/0xf0 [ 698.439956][T24608] __generic_file_write_iter+0x195/0x2b0 [ 698.445605][T24608] ? generic_write_checks+0x250/0x290 [ 698.450956][T24608] generic_file_write_iter+0x75/0x130 [ 698.456325][T24608] do_iter_readv_writev+0x2de/0x380 [ 698.461575][T24608] do_iter_write+0x192/0x5c0 [ 698.466237][T24608] ? splice_from_pipe_next+0x34f/0x3b0 [ 698.471849][T24608] ? kmalloc_array+0x2d/0x40 [ 698.476760][T24608] vfs_iter_write+0x4c/0x70 [ 698.481251][T24608] iter_file_splice_write+0x43a/0x790 [ 698.486666][T24608] ? splice_from_pipe+0xd0/0xd0 [ 698.491631][T24608] direct_splice_actor+0x80/0xa0 [ 698.496549][T24608] splice_direct_to_actor+0x345/0x650 [ 698.501978][T24608] ? do_splice_direct+0x190/0x190 [ 698.507102][T24608] do_splice_direct+0x106/0x190 [ 698.511931][T24608] do_sendfile+0x675/0xc40 [ 698.516447][T24608] __x64_sys_sendfile64+0x102/0x140 [ 698.521621][T24608] do_syscall_64+0x44/0xd0 [ 698.526078][T24608] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 698.532010][T24608] RIP: 0033:0x7fe1cb921ae9 [ 698.536438][T24608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 698.556218][T24608] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 698.564632][T24608] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 698.572589][T24608] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 698.580566][T24608] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 698.588534][T24608] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 11:03:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 19) [ 698.596500][T24608] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 698.604574][T24608] [ 698.645452][T24618] loop1: detected capacity change from 0 to 262160 [ 698.648957][T24621] loop5: detected capacity change from 0 to 262160 [ 698.652554][T24620] loop0: detected capacity change from 0 to 262160 [ 698.667717][T24623] loop3: detected capacity change from 0 to 262160 [ 698.696268][T24623] FAULT_INJECTION: forcing a failure. [ 698.696268][T24623] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 698.709552][T24623] CPU: 0 PID: 24623 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 698.718338][T24623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.728393][T24623] Call Trace: [ 698.731717][T24623] [ 698.734650][T24623] dump_stack_lvl+0xd6/0x122 [ 698.739247][T24623] dump_stack+0x11/0x1b [ 698.743406][T24623] should_fail+0x23c/0x250 [ 698.747830][T24623] __alloc_pages+0x102/0x330 [ 698.752466][T24623] alloc_pages+0x382/0x3d0 [ 698.756883][T24623] folio_alloc+0x1a/0x20 [ 698.761231][T24623] filemap_alloc_folio+0x53/0xf0 [ 698.766178][T24623] __filemap_get_folio+0x443/0x690 [ 698.771298][T24623] pagecache_get_page+0x26/0xe0 [ 698.776168][T24623] grab_cache_page_write_begin+0x3f/0x50 [ 698.781821][T24623] cont_write_begin+0x4ab/0x7b0 [ 698.786703][T24623] fat_write_begin+0x61/0xf0 [ 698.791280][T24623] ? fat_block_truncate_page+0x30/0x30 [ 698.796773][T24623] generic_perform_write+0x1c8/0x400 [ 698.802096][T24623] ? fat_write_begin+0xf0/0xf0 [ 698.807026][T24623] __generic_file_write_iter+0x195/0x2b0 [ 698.812648][T24623] ? generic_write_checks+0x250/0x290 [ 698.818008][T24623] generic_file_write_iter+0x75/0x130 [ 698.823437][T24623] do_iter_readv_writev+0x2de/0x380 [ 698.828769][T24623] do_iter_write+0x192/0x5c0 [ 698.833349][T24623] ? splice_from_pipe_next+0x34f/0x3b0 [ 698.838833][T24623] ? kmalloc_array+0x2d/0x40 [ 698.843453][T24623] vfs_iter_write+0x4c/0x70 [ 698.847961][T24623] iter_file_splice_write+0x43a/0x790 [ 698.853421][T24623] ? splice_from_pipe+0xd0/0xd0 [ 698.858289][T24623] direct_splice_actor+0x80/0xa0 [ 698.863232][T24623] splice_direct_to_actor+0x345/0x650 [ 698.868685][T24623] ? do_splice_direct+0x190/0x190 [ 698.873732][T24623] do_splice_direct+0x106/0x190 [ 698.878568][T24623] do_sendfile+0x675/0xc40 [ 698.882990][T24623] __x64_sys_sendfile64+0x102/0x140 [ 698.888173][T24623] do_syscall_64+0x44/0xd0 [ 698.892572][T24623] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 698.898489][T24623] RIP: 0033:0x7fe1cb921ae9 [ 698.902892][T24623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 698.922498][T24623] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 698.931064][T24623] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 698.939031][T24623] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 11:03:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000b1) 11:03:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000016) 11:03:15 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000600)=ANY=[@ANYBLOB="01000000010000dd1700000058174acd17d141708a3ad58cbcd4d76a61160c953fde137479f55bc18684ee61e4abec1f7a8ad364506d841d72067bd609b7afa29f4b68c8c92f7f31ae1608995dcf82e327de72849e225b68c59e8cd96ba270", @ANYRES32=r1, @ANYBLOB="3c020000000000002e2f66696c653000"]) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r4 = dup2(r3, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0xc0182101, &(0x7f00000001c0)={r5}) r6 = fsmount(r2, 0x0, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) add_key$keyring(&(0x7f0000000080), &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000300)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x522040}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@delqdisc={0x34, 0x25, 0x100, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r7, {0x2, 0x5}, {0xfff3}, {0xffff}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x2}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x8011}, 0x40000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000680)) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f00000004c0)={[{@fat=@gid}]}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000700)={{0x1, 0x1, 0x18, r4, {r8}}, './file0\x00'}) r10 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000000400)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x4, r10, r8, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) 11:03:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 20) 11:03:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a000) [ 698.947047][T24623] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 698.955013][T24623] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 698.962967][T24623] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 698.970933][T24623] 11:03:15 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000701) [ 699.061002][T24633] loop5: detected capacity change from 0 to 262160 [ 699.077182][T24636] loop1: detected capacity change from 0 to 262160 [ 699.087812][T24638] loop3: detected capacity change from 0 to 262160 [ 699.094902][T24639] loop0: detected capacity change from 0 to 262160 [ 699.112186][T24638] FAULT_INJECTION: forcing a failure. [ 699.112186][T24638] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.124133][T24643] FAT-fs (loop2): bogus number of reserved sectors [ 699.125493][T24638] CPU: 0 PID: 24638 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 699.131937][T24643] FAT-fs (loop2): Can't find a valid FAT filesystem [ 699.140673][T24638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.140687][T24638] Call Trace: [ 699.140693][T24638] [ 699.140705][T24638] dump_stack_lvl+0xd6/0x122 [ 699.140731][T24638] dump_stack+0x11/0x1b [ 699.140748][T24638] should_fail+0x23c/0x250 [ 699.176889][T24638] __alloc_pages+0x102/0x330 [ 699.181503][T24638] alloc_pages+0x382/0x3d0 [ 699.185952][T24638] folio_alloc+0x1a/0x20 [ 699.190189][T24638] filemap_alloc_folio+0x53/0xf0 [ 699.195126][T24638] __filemap_get_folio+0x443/0x690 [ 699.200243][T24638] pagecache_get_page+0x26/0xe0 [ 699.205092][T24638] grab_cache_page_write_begin+0x3f/0x50 [ 699.210726][T24638] cont_write_begin+0x4ab/0x7b0 [ 699.215625][T24638] fat_write_begin+0x61/0xf0 [ 699.220259][T24638] ? fat_block_truncate_page+0x30/0x30 [ 699.225727][T24638] generic_perform_write+0x1c8/0x400 [ 699.231055][T24638] ? fat_write_begin+0xf0/0xf0 [ 699.235859][T24638] __generic_file_write_iter+0x195/0x2b0 [ 699.241545][T24638] ? generic_write_checks+0x250/0x290 [ 699.246996][T24638] generic_file_write_iter+0x75/0x130 [ 699.252460][T24638] do_iter_readv_writev+0x2de/0x380 [ 699.257675][T24638] do_iter_write+0x192/0x5c0 [ 699.262279][T24638] ? splice_from_pipe_next+0x34f/0x3b0 [ 699.267764][T24638] ? kmalloc_array+0x2d/0x40 [ 699.272455][T24638] vfs_iter_write+0x4c/0x70 [ 699.276977][T24638] iter_file_splice_write+0x43a/0x790 [ 699.282356][T24638] ? splice_from_pipe+0xd0/0xd0 [ 699.287243][T24638] direct_splice_actor+0x80/0xa0 [ 699.292239][T24638] splice_direct_to_actor+0x345/0x650 [ 699.297611][T24638] ? do_splice_direct+0x190/0x190 [ 699.302636][T24638] do_splice_direct+0x106/0x190 [ 699.307481][T24638] do_sendfile+0x675/0xc40 [ 699.311924][T24638] __x64_sys_sendfile64+0x102/0x140 [ 699.317118][T24638] do_syscall_64+0x44/0xd0 [ 699.321535][T24638] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 699.327434][T24638] RIP: 0033:0x7fe1cb921ae9 [ 699.331846][T24638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.351509][T24638] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 11:03:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000b2) 11:03:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a100) [ 699.359994][T24638] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 699.367960][T24638] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 699.375941][T24638] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 699.383908][T24638] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 699.391940][T24638] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 699.399914][T24638] 11:03:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000017) 11:03:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 21) [ 699.461012][T24649] loop5: detected capacity change from 0 to 262160 [ 699.482657][T24653] loop1: detected capacity change from 0 to 262160 [ 699.488876][T24655] loop3: detected capacity change from 0 to 262160 [ 699.489626][T24652] loop0: detected capacity change from 0 to 262160 [ 699.507687][T24655] FAULT_INJECTION: forcing a failure. [ 699.507687][T24655] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.521232][T24655] CPU: 1 PID: 24655 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 699.529994][T24655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.540072][T24655] Call Trace: [ 699.543354][T24655] [ 699.546365][T24655] dump_stack_lvl+0xd6/0x122 [ 699.551067][T24655] dump_stack+0x11/0x1b [ 699.555253][T24655] should_fail+0x23c/0x250 [ 699.559704][T24655] __alloc_pages+0x102/0x330 [ 699.564312][T24655] alloc_pages+0x382/0x3d0 [ 699.568847][T24655] folio_alloc+0x1a/0x20 [ 699.573098][T24655] filemap_alloc_folio+0x53/0xf0 [ 699.578150][T24655] __filemap_get_folio+0x443/0x690 [ 699.583273][T24655] pagecache_get_page+0x26/0xe0 [ 699.588141][T24655] grab_cache_page_write_begin+0x3f/0x50 [ 699.593808][T24655] cont_write_begin+0x4ab/0x7b0 [ 699.598746][T24655] fat_write_begin+0x61/0xf0 [ 699.603340][T24655] ? fat_block_truncate_page+0x30/0x30 11:03:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000b3) 11:03:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000018) 11:03:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a200) [ 699.608802][T24655] generic_perform_write+0x1c8/0x400 [ 699.614094][T24655] ? fat_write_begin+0xf0/0xf0 [ 699.618921][T24655] __generic_file_write_iter+0x195/0x2b0 [ 699.624572][T24655] ? generic_write_checks+0x250/0x290 [ 699.629940][T24655] generic_file_write_iter+0x75/0x130 [ 699.635365][T24655] do_iter_readv_writev+0x2de/0x380 [ 699.640593][T24655] do_iter_write+0x192/0x5c0 [ 699.645244][T24655] ? splice_from_pipe_next+0x34f/0x3b0 [ 699.650739][T24655] ? kmalloc_array+0x2d/0x40 [ 699.655374][T24655] vfs_iter_write+0x4c/0x70 [ 699.659880][T24655] iter_file_splice_write+0x43a/0x790 [ 699.665313][T24655] ? splice_from_pipe+0xd0/0xd0 [ 699.670162][T24655] direct_splice_actor+0x80/0xa0 [ 699.675166][T24655] splice_direct_to_actor+0x345/0x650 [ 699.680622][T24655] ? do_splice_direct+0x190/0x190 [ 699.685666][T24655] do_splice_direct+0x106/0x190 [ 699.690520][T24655] do_sendfile+0x675/0xc40 [ 699.694937][T24655] __x64_sys_sendfile64+0x102/0x140 [ 699.700177][T24655] do_syscall_64+0x44/0xd0 [ 699.704658][T24655] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 699.710557][T24655] RIP: 0033:0x7fe1cb921ae9 [ 699.714967][T24655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.734625][T24655] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 699.743301][T24655] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 699.751279][T24655] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 11:03:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 22) [ 699.759345][T24655] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 699.767316][T24655] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 699.775284][T24655] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 699.783482][T24655] [ 699.847019][T24660] loop5: detected capacity change from 0 to 262160 [ 699.848950][T24663] loop0: detected capacity change from 0 to 262160 [ 699.854950][T24664] loop1: detected capacity change from 0 to 262160 [ 699.881030][T24666] loop3: detected capacity change from 0 to 262160 [ 699.913945][T24666] FAULT_INJECTION: forcing a failure. [ 699.913945][T24666] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.927748][T24666] CPU: 1 PID: 24666 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 699.936534][T24666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.946736][T24666] Call Trace: [ 699.950002][T24666] [ 699.953060][T24666] dump_stack_lvl+0xd6/0x122 [ 699.957968][T24666] dump_stack+0x11/0x1b [ 699.962127][T24666] should_fail+0x23c/0x250 [ 699.966560][T24666] __alloc_pages+0x102/0x330 [ 699.971161][T24666] alloc_pages+0x382/0x3d0 [ 699.975626][T24666] folio_alloc+0x1a/0x20 [ 699.979866][T24666] filemap_alloc_folio+0x53/0xf0 [ 699.985101][T24666] __filemap_get_folio+0x443/0x690 [ 699.990233][T24666] pagecache_get_page+0x26/0xe0 [ 699.995090][T24666] grab_cache_page_write_begin+0x3f/0x50 [ 700.000975][T24666] cont_write_begin+0x4ab/0x7b0 [ 700.005924][T24666] fat_write_begin+0x61/0xf0 [ 700.010600][T24666] ? fat_block_truncate_page+0x30/0x30 [ 700.016096][T24666] generic_perform_write+0x1c8/0x400 [ 700.021389][T24666] ? fat_write_begin+0xf0/0xf0 [ 700.026223][T24666] __generic_file_write_iter+0x195/0x2b0 [ 700.031861][T24666] ? generic_write_checks+0x250/0x290 [ 700.037368][T24666] generic_file_write_iter+0x75/0x130 [ 700.042740][T24666] do_iter_readv_writev+0x2de/0x380 [ 700.047980][T24666] do_iter_write+0x192/0x5c0 [ 700.052590][T24666] ? splice_from_pipe_next+0x34f/0x3b0 [ 700.058090][T24666] ? kmalloc_array+0x2d/0x40 [ 700.062706][T24666] vfs_iter_write+0x4c/0x70 [ 700.067279][T24666] iter_file_splice_write+0x43a/0x790 [ 700.072694][T24666] ? splice_from_pipe+0xd0/0xd0 [ 700.077605][T24666] direct_splice_actor+0x80/0xa0 [ 700.082551][T24666] splice_direct_to_actor+0x345/0x650 [ 700.087928][T24666] ? do_splice_direct+0x190/0x190 [ 700.092958][T24666] do_splice_direct+0x106/0x190 [ 700.097841][T24666] do_sendfile+0x675/0xc40 [ 700.102263][T24666] __x64_sys_sendfile64+0x102/0x140 [ 700.107468][T24666] do_syscall_64+0x44/0xd0 [ 700.111888][T24666] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 700.117843][T24666] RIP: 0033:0x7fe1cb921ae9 [ 700.122254][T24666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.141953][T24666] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 700.150380][T24666] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 700.158346][T24666] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 700.166326][T24666] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 700.174289][T24666] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 700.182341][T24666] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 700.190304][T24666] 11:03:17 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0xb2, 0x1, 0x1, "c9d8ed640a5ea2deb8cb5dfe955bd3a5", "3c35dec5c7218bc4261710194fdfd5ed4bffd047edfe14c3aa45dca0c576c925429ba6d81d587ce077c4f0ffd7b41970f56207dbc2c00e75593d95bf0adee32d70495760ba5fb54ffab04817335bbd236da3a13506f1cbaf5721bd6f711783ce3d29ce0b9154bc2ff716e214950e555d9d9deda4dae62a165a050aa82272945bf951e0911eaf48effa00bf1a8f3dd166b1725d576220e542df66b7b3ab"}, 0xb2, 0x1) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @auto=[0x62, 0x32, 0x30, 0x36, 0x39, 0x37, 0x35, 0x66, 0x39, 0x64, 0x1, 0x33, 0x37, 0x6e, 0x31, 0x31]}, &(0x7f0000000280)={0x0, "da0f239fd6391c18a4794f3b476fd6f3ac6024c994436a693b1ae19fff268e0384be31a18d79f3e8b4fbcc8230fe6dc2a0a3ead8081db1d7c602aedea8ee5dc2", 0x34}, 0x48, 0xfffffffffffffffd) keyctl$setperm(0x5, r2, 0x100) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r4, r5) r6 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r6, r4, 0x0) 11:03:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a300) 11:03:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000019) 11:03:17 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000801) 11:03:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000b4) 11:03:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 23) 11:03:17 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0xa, 0x5, 0x0) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = geteuid() r6 = syz_open_dev$vcsu(&(0x7f0000000100), 0x3, 0x4000) sendto$l2tp(r6, &(0x7f0000000140)="332396dd3ce6c70350949345a1d7abef24dc6f0ece36abc72a6c8a1f", 0x1c, 0x4000080, &(0x7f00000001c0)={0x2, 0x0, @local, 0x4}, 0x10) setresuid(r5, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, 0x0, r5, r4) r7 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="b691e828dacf519c410e67175f07e1fdc767efbdf78ff59d6d574b490fbe777b", 0x20, r0) keyctl$chown(0x4, r7, r3, 0x0) 11:03:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001a) [ 700.257367][T24675] loop0: detected capacity change from 0 to 262160 [ 700.263180][T24679] loop1: detected capacity change from 0 to 262160 [ 700.286580][T24685] loop5: detected capacity change from 0 to 262160 [ 700.292496][T24686] loop3: detected capacity change from 0 to 262160 [ 700.339735][T24686] FAULT_INJECTION: forcing a failure. [ 700.339735][T24686] name failslab, interval 1, probability 0, space 0, times 0 [ 700.352492][T24686] CPU: 0 PID: 24686 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 700.361309][T24686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.371410][T24686] Call Trace: [ 700.374687][T24686] [ 700.377618][T24686] dump_stack_lvl+0xd6/0x122 [ 700.382207][T24686] dump_stack+0x11/0x1b [ 700.386383][T24686] should_fail+0x23c/0x250 [ 700.390828][T24686] ? mempool_alloc_slab+0x16/0x20 [ 700.395842][T24686] __should_failslab+0x81/0x90 [ 700.400724][T24686] should_failslab+0x5/0x20 [ 700.405289][T24686] kmem_cache_alloc+0x4f/0x320 [ 700.410091][T24686] mempool_alloc_slab+0x16/0x20 [ 700.414980][T24686] ? mempool_free+0x130/0x130 [ 700.419659][T24686] mempool_alloc+0x9d/0x310 [ 700.424153][T24686] ? xas_load+0x276/0x2a0 [ 700.428505][T24686] bio_alloc_bioset+0xcc/0x560 [ 700.433308][T24686] ? find_get_pages_range+0x305/0x350 [ 700.438745][T24686] ? bdev_write_page+0x83/0x110 [ 700.443755][T24686] __mpage_writepage+0x9eb/0x1060 [ 700.448778][T24686] write_cache_pages+0x454/0x7f0 [ 700.453766][T24686] ? mpage_writepages+0x130/0x130 [ 700.458781][T24686] ? fat_block_truncate_page+0x30/0x30 [ 700.464227][T24686] mpage_writepages+0x7f/0x130 [ 700.468980][T24686] ? fat_block_truncate_page+0x30/0x30 [ 700.474485][T24686] ? fat_readpage+0x20/0x20 [ 700.479017][T24686] fat_writepages+0x20/0x30 [ 700.483514][T24686] do_writepages+0x1cb/0x330 [ 700.488103][T24686] ? generic_perform_write+0x397/0x400 [ 700.493587][T24686] filemap_write_and_wait_range+0x1b2/0x340 [ 700.499600][T24686] __generic_file_write_iter+0x1c5/0x2b0 [ 700.505306][T24686] generic_file_write_iter+0x75/0x130 [ 700.510743][T24686] do_iter_readv_writev+0x2de/0x380 [ 700.515966][T24686] do_iter_write+0x192/0x5c0 [ 700.520598][T24686] ? splice_from_pipe_next+0x34f/0x3b0 [ 700.526115][T24686] ? kmalloc_array+0x2d/0x40 [ 700.530697][T24686] vfs_iter_write+0x4c/0x70 [ 700.535190][T24686] iter_file_splice_write+0x43a/0x790 [ 700.540627][T24686] ? splice_from_pipe+0xd0/0xd0 [ 700.545514][T24686] direct_splice_actor+0x80/0xa0 [ 700.550524][T24686] splice_direct_to_actor+0x345/0x650 [ 700.555887][T24686] ? do_splice_direct+0x190/0x190 [ 700.560986][T24686] do_splice_direct+0x106/0x190 [ 700.565912][T24686] do_sendfile+0x675/0xc40 [ 700.570331][T24686] __x64_sys_sendfile64+0x102/0x140 [ 700.575520][T24686] do_syscall_64+0x44/0xd0 [ 700.579983][T24686] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 700.585879][T24686] RIP: 0033:0x7fe1cb921ae9 [ 700.590275][T24686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.609972][T24686] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 700.618442][T24686] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 700.626429][T24686] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 11:03:17 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x800, 0xfffffffd) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) 11:03:17 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r5 = dup2(r4, r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0xc0182101, &(0x7f00000001c0)={r6}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x4, 0x3f, 0x9, 0x9}]}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000040)={0x20}, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) keyctl$chown(0x4, 0x0, 0xee00, r3) r7 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r7, r2, 0x0) 11:03:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a400) [ 700.634577][T24686] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 700.642627][T24686] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 700.650619][T24686] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 700.658580][T24686] 11:03:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000b5) 11:03:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 24) 11:03:17 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x2f, 0x5, 0x0, 0x101, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev={0xfe, 0x80, '\x00', 0xd}, 0x7, 0x0, 0x0, 0x7}}) keyctl$chown(0x4, 0x0, 0xee00, r3) keyctl$read(0xb, r0, &(0x7f0000000100)=""/3, 0x3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) 11:03:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001b) [ 700.681501][T24700] loop1: detected capacity change from 0 to 262160 [ 700.707196][T24703] loop0: detected capacity change from 0 to 262160 [ 700.770579][T24719] loop3: detected capacity change from 0 to 262160 [ 700.777553][T24720] loop5: detected capacity change from 0 to 262160 [ 700.808483][T24719] FAULT_INJECTION: forcing a failure. [ 700.808483][T24719] name failslab, interval 1, probability 0, space 0, times 0 [ 700.810305][T24722] loop1: detected capacity change from 0 to 262160 [ 700.821147][T24719] CPU: 0 PID: 24719 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 700.836394][T24719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.846520][T24719] Call Trace: [ 700.849798][T24719] [ 700.852725][T24719] dump_stack_lvl+0xd6/0x122 [ 700.857397][T24719] dump_stack+0x11/0x1b [ 700.861560][T24719] should_fail+0x23c/0x250 [ 700.866013][T24719] ? mempool_alloc_slab+0x16/0x20 [ 700.871046][T24719] __should_failslab+0x81/0x90 [ 700.875814][T24719] should_failslab+0x5/0x20 [ 700.880316][T24719] kmem_cache_alloc+0x4f/0x320 [ 700.885083][T24719] ? mempool_alloc_slab+0x16/0x20 [ 700.890400][T24719] mempool_alloc_slab+0x16/0x20 [ 700.895334][T24719] ? mempool_free+0x130/0x130 [ 700.900052][T24719] mempool_alloc+0x9d/0x310 [ 700.904565][T24719] ? xas_load+0x276/0x2a0 [ 700.908936][T24719] bio_alloc_bioset+0x1af/0x560 [ 700.913764][T24719] __mpage_writepage+0x9eb/0x1060 [ 700.918774][T24719] write_cache_pages+0x454/0x7f0 [ 700.923698][T24719] ? mpage_writepages+0x130/0x130 [ 700.928724][T24719] ? fat_block_truncate_page+0x30/0x30 [ 700.934178][T24719] mpage_writepages+0x7f/0x130 [ 700.938986][T24719] ? fat_block_truncate_page+0x30/0x30 [ 700.944503][T24719] ? fat_readpage+0x20/0x20 [ 700.949010][T24719] fat_writepages+0x20/0x30 [ 700.953578][T24719] do_writepages+0x1cb/0x330 [ 700.958148][T24719] ? generic_perform_write+0x397/0x400 [ 700.964028][T24719] filemap_write_and_wait_range+0x1b2/0x340 [ 700.969965][T24719] __generic_file_write_iter+0x1c5/0x2b0 [ 700.975763][T24719] generic_file_write_iter+0x75/0x130 [ 700.981136][T24719] do_iter_readv_writev+0x2de/0x380 [ 700.986421][T24719] do_iter_write+0x192/0x5c0 [ 700.991001][T24719] ? splice_from_pipe_next+0x34f/0x3b0 [ 700.996460][T24719] ? kmalloc_array+0x2d/0x40 [ 701.001128][T24719] vfs_iter_write+0x4c/0x70 [ 701.005613][T24719] iter_file_splice_write+0x43a/0x790 [ 701.011037][T24719] ? splice_from_pipe+0xd0/0xd0 [ 701.016197][T24719] direct_splice_actor+0x80/0xa0 [ 701.021148][T24719] splice_direct_to_actor+0x345/0x650 [ 701.026497][T24719] ? do_splice_direct+0x190/0x190 [ 701.031501][T24719] do_splice_direct+0x106/0x190 [ 701.036375][T24719] do_sendfile+0x675/0xc40 [ 701.040794][T24719] __x64_sys_sendfile64+0x102/0x140 [ 701.045971][T24719] do_syscall_64+0x44/0xd0 [ 701.050430][T24719] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 701.056307][T24719] RIP: 0033:0x7fe1cb921ae9 [ 701.060710][T24719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.080459][T24719] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 701.088948][T24719] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 701.097213][T24719] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 701.105238][T24719] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.113340][T24719] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 701.121298][T24719] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 701.129294][T24719] 11:03:18 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000901) 11:03:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a500) 11:03:18 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getqdisc={0x38, 0x26, 0x300, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0xc}, {0xd, 0xffe0}, {0xfff2, 0x5}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) keyctl$chown(0x4, r4, r2, 0x0) 11:03:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000d8) 11:03:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001c) 11:03:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 25) 11:03:18 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r5 = dup2(r4, r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0xc0182101, &(0x7f00000001c0)={r6}) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) dup2(r7, r7) preadv(r7, &(0x7f0000000100), 0x0, 0x2, 0x5a6a292b) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000000c0)={'xfrm0\x00'}) keyctl$chown(0x4, 0x0, 0xee00, r3) r8 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x4, r8, r2, 0x0) [ 701.246374][T24733] loop0: detected capacity change from 0 to 262160 [ 701.249247][T24732] loop5: detected capacity change from 0 to 262160 [ 701.265068][T24735] loop3: detected capacity change from 0 to 262160 [ 701.273032][T24736] loop1: detected capacity change from 0 to 262160 [ 701.290667][T24735] FAULT_INJECTION: forcing a failure. [ 701.290667][T24735] name failslab, interval 1, probability 0, space 0, times 0 [ 701.303354][T24735] CPU: 0 PID: 24735 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 701.312126][T24735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.322187][T24735] Call Trace: [ 701.325478][T24735] [ 701.328405][T24735] dump_stack_lvl+0xd6/0x122 [ 701.333005][T24735] dump_stack+0x11/0x1b [ 701.337168][T24735] should_fail+0x23c/0x250 [ 701.341589][T24735] ? mempool_alloc_slab+0x16/0x20 [ 701.346758][T24735] __should_failslab+0x81/0x90 [ 701.351519][T24735] should_failslab+0x5/0x20 [ 701.356107][T24735] kmem_cache_alloc+0x4f/0x320 [ 701.360916][T24735] mempool_alloc_slab+0x16/0x20 [ 701.365856][T24735] ? mempool_free+0x130/0x130 [ 701.370530][T24735] mempool_alloc+0x9d/0x310 [ 701.375075][T24735] bio_alloc_bioset+0xcc/0x560 [ 701.379916][T24735] ? time64_to_tm+0x328/0x340 [ 701.384591][T24735] submit_bh_wbc+0x133/0x320 [ 701.389208][T24735] __sync_dirty_buffer+0x136/0x1e0 [ 701.394322][T24735] sync_dirty_buffer+0x16/0x20 [ 701.399152][T24735] __fat_write_inode+0x4a4/0x4e0 [ 701.404135][T24735] fat_write_inode+0xb9/0xd0 [ 701.408779][T24735] write_inode+0x89/0x1f0 [ 701.413108][T24735] __writeback_single_inode+0x286/0x4d0 [ 701.418657][T24735] writeback_single_inode+0x11f/0x3d0 [ 701.424082][T24735] ? __down_write_common+0x42/0x7b0 [ 701.429334][T24735] ? file_check_and_advance_wb_err+0x9b/0x170 [ 701.435410][T24735] ? file_write_and_wait_range+0xe2/0x1d0 [ 701.441135][T24735] ? sync_mapping_buffers+0x33e/0x800 [ 701.446506][T24735] sync_inode_metadata+0x57/0x80 [ 701.451486][T24735] __generic_file_fsync+0xf5/0x140 [ 701.456592][T24735] fat_file_fsync+0x48/0x100 [ 701.461184][T24735] ? fat_generic_ioctl+0xb10/0xb10 [ 701.466432][T24735] vfs_fsync_range+0x107/0x120 [ 701.471198][T24735] generic_file_write_iter+0x103/0x130 [ 701.476713][T24735] do_iter_readv_writev+0x2de/0x380 [ 701.481947][T24735] do_iter_write+0x192/0x5c0 [ 701.486550][T24735] ? splice_from_pipe_next+0x34f/0x3b0 [ 701.492001][T24735] ? kmalloc_array+0x2d/0x40 [ 701.496593][T24735] vfs_iter_write+0x4c/0x70 [ 701.501105][T24735] iter_file_splice_write+0x43a/0x790 [ 701.506558][T24735] ? splice_from_pipe+0xd0/0xd0 [ 701.511451][T24735] direct_splice_actor+0x80/0xa0 [ 701.516385][T24735] splice_direct_to_actor+0x345/0x650 [ 701.521793][T24735] ? do_splice_direct+0x190/0x190 [ 701.526816][T24735] do_splice_direct+0x106/0x190 [ 701.531702][T24735] do_sendfile+0x675/0xc40 [ 701.536303][T24735] __x64_sys_sendfile64+0x102/0x140 [ 701.541503][T24735] do_syscall_64+0x44/0xd0 [ 701.545940][T24735] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 701.551894][T24735] RIP: 0033:0x7fe1cb921ae9 [ 701.556299][T24735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.575907][T24735] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 701.584315][T24735] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 11:03:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000d9) 11:03:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a600) [ 701.592281][T24735] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 701.600245][T24735] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.608201][T24735] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 701.620955][T24735] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 701.628932][T24735] 11:03:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 26) 11:03:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001d) 11:03:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000da) [ 701.689176][T24746] loop5: detected capacity change from 0 to 262160 [ 701.698923][T24749] loop0: detected capacity change from 0 to 262160 [ 701.724151][T24752] loop3: detected capacity change from 0 to 262160 [ 701.741776][T24754] loop1: detected capacity change from 0 to 262160 [ 701.757673][T24752] FAULT_INJECTION: forcing a failure. [ 701.757673][T24752] name failslab, interval 1, probability 0, space 0, times 0 [ 701.770354][T24752] CPU: 0 PID: 24752 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 701.779122][T24752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.789242][T24752] Call Trace: [ 701.792527][T24752] [ 701.795456][T24752] dump_stack_lvl+0xd6/0x122 [ 701.800116][T24752] dump_stack+0x11/0x1b [ 701.804295][T24752] should_fail+0x23c/0x250 [ 701.808705][T24752] ? mempool_alloc_slab+0x16/0x20 [ 701.813760][T24752] __should_failslab+0x81/0x90 [ 701.818526][T24752] should_failslab+0x5/0x20 [ 701.823037][T24752] kmem_cache_alloc+0x4f/0x320 [ 701.827801][T24752] mempool_alloc_slab+0x16/0x20 [ 701.832748][T24752] ? mempool_free+0x130/0x130 [ 701.837427][T24752] mempool_alloc+0x9d/0x310 [ 701.841967][T24752] ? fat_write_inode+0xb9/0xd0 [ 701.846781][T24752] bio_alloc_bioset+0xcc/0x560 [ 701.851554][T24752] ? inode_add_lru+0x6d/0x160 [ 701.856238][T24752] submit_bh_wbc+0x133/0x320 [ 701.860933][T24752] write_dirty_buffer+0xde/0xf0 [ 701.865816][T24752] sync_mapping_buffers+0x2be/0x800 [ 701.871021][T24752] ? file_check_and_advance_wb_err+0x9b/0x170 [ 701.877105][T24752] fat_file_fsync+0xa9/0x100 [ 701.881741][T24752] ? fat_generic_ioctl+0xb10/0xb10 [ 701.886855][T24752] vfs_fsync_range+0x107/0x120 [ 701.891627][T24752] generic_file_write_iter+0x103/0x130 [ 701.897153][T24752] do_iter_readv_writev+0x2de/0x380 [ 701.902384][T24752] do_iter_write+0x192/0x5c0 [ 701.907046][T24752] ? splice_from_pipe_next+0x34f/0x3b0 [ 701.912568][T24752] ? kmalloc_array+0x2d/0x40 [ 701.917261][T24752] vfs_iter_write+0x4c/0x70 [ 701.921776][T24752] iter_file_splice_write+0x43a/0x790 [ 701.927166][T24752] ? splice_from_pipe+0xd0/0xd0 [ 701.932095][T24752] direct_splice_actor+0x80/0xa0 [ 701.937090][T24752] splice_direct_to_actor+0x345/0x650 [ 701.942514][T24752] ? do_splice_direct+0x190/0x190 [ 701.947584][T24752] do_splice_direct+0x106/0x190 [ 701.952445][T24752] do_sendfile+0x675/0xc40 [ 701.956864][T24752] __x64_sys_sendfile64+0x102/0x140 [ 701.962131][T24752] do_syscall_64+0x44/0xd0 [ 701.966546][T24752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 701.972471][T24752] RIP: 0033:0x7fe1cb921ae9 [ 701.976993][T24752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.996599][T24752] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 702.005018][T24752] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 702.013041][T24752] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 702.021013][T24752] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 702.028986][T24752] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 702.036962][T24752] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 702.044942][T24752] [ 702.058377][T24759] loop5: detected capacity change from 0 to 262160 [ 702.154628][ T24] kauditd_printk_skb: 6907 callbacks suppressed [ 702.154642][ T24] audit: type=1326 audit(1638788598.959:1067890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24737 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 702.185455][ T24] audit: type=1326 audit(1638788598.959:1067891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24737 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=33 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 702.209618][ T24] audit: type=1326 audit(1638788598.959:1067892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24737 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 702.233855][ T24] audit: type=1326 audit(1638788598.959:1067893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24737 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 702.258065][ T24] audit: type=1326 audit(1638788598.959:1067894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24737 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 702.282298][ T24] audit: type=1326 audit(1638788598.959:1067895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24737 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 702.306528][ T24] audit: type=1326 audit(1638788598.959:1067896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24737 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 702.330749][ T24] audit: type=1326 audit(1638788598.959:1067897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24737 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 702.355025][ T24] audit: type=1326 audit(1638788598.959:1067898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24737 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 702.379245][ T24] audit: type=1326 audit(1638788598.959:1067899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24737 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000a01) 11:03:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a700) 11:03:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 27) 11:03:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001e) 11:03:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000db) 11:03:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r3 = dup2(r2, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0xc0182101, &(0x7f00000001c0)={r4}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r7, 0xee00, r6) r8 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r9 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000400)={'syz_tun\x00', {0x2, 0x0, @local}}) keyctl$setperm(0x5, r9, 0x1c243911) keyctl$chown(0x4, r9, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r9, 0xffffffffffffffff, r10) keyctl$get_security(0x11, r9, 0x0, 0x0) add_key$user(&(0x7f0000000140), &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="90666b18e2872ac95522a87a87470cde9756af09717622d45784b81b4cea24f862c0bc05a0e0b9a811f3a6a923caa222d878918524282d83f0dc63b3d533d69f1e7e367c7283a0bfac5d90fe857ce6fe3fab40cb6f062bf675dc9e9dedbd1706dd897d115871dd1db4708671b7de6a9b8996a0dd46ef18056722bb6220a220431612a5d92ee2a11113b5db1bbf0ce37ff97a8a1d925d32dfd0d6b4e0f5b6d0c004d27278199bf147fad0538879f109104e98af4c80721d2bca2a6c60c021e5d795b9a4613d6cd7e4a3aeaf81113c4ae3dd2aaca26c4fe8b3c306738b29940a7244aedeb7b1", 0xe5, r9) keyctl$chown(0x4, r8, r5, 0x0) [ 702.511381][T24767] loop3: detected capacity change from 0 to 262160 [ 702.514976][T24770] loop5: detected capacity change from 0 to 262160 [ 702.525315][T24772] loop1: detected capacity change from 0 to 262160 [ 702.525935][T24773] loop0: detected capacity change from 0 to 262160 [ 702.535913][T24767] FAULT_INJECTION: forcing a failure. [ 702.535913][T24767] name failslab, interval 1, probability 0, space 0, times 0 [ 702.551038][T24767] CPU: 1 PID: 24767 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 702.559809][T24767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.569853][T24767] Call Trace: [ 702.573161][T24767] [ 702.576073][T24767] dump_stack_lvl+0xd6/0x122 [ 702.580650][T24767] dump_stack+0x11/0x1b [ 702.584861][T24767] should_fail+0x23c/0x250 [ 702.589261][T24767] ? mempool_alloc_slab+0x16/0x20 [ 702.594703][T24767] __should_failslab+0x81/0x90 [ 702.599452][T24767] should_failslab+0x5/0x20 [ 702.603939][T24767] kmem_cache_alloc+0x4f/0x320 [ 702.608688][T24767] mempool_alloc_slab+0x16/0x20 [ 702.613536][T24767] ? mempool_free+0x130/0x130 [ 702.618237][T24767] mempool_alloc+0x9d/0x310 [ 702.622739][T24767] ? submit_bio_noacct+0x49f/0x4e0 [ 702.627906][T24767] bio_alloc_bioset+0xcc/0x560 [ 702.632655][T24767] submit_bh_wbc+0x133/0x320 [ 702.637233][T24767] write_dirty_buffer+0xde/0xf0 [ 702.642120][T24767] sync_mapping_buffers+0x2be/0x800 [ 702.647313][T24767] ? file_check_and_advance_wb_err+0x9b/0x170 [ 702.653407][T24767] fat_file_fsync+0xa9/0x100 [ 702.657984][T24767] ? fat_generic_ioctl+0xb10/0xb10 [ 702.663090][T24767] vfs_fsync_range+0x107/0x120 [ 702.667852][T24767] generic_file_write_iter+0x103/0x130 [ 702.673328][T24767] do_iter_readv_writev+0x2de/0x380 [ 702.678515][T24767] do_iter_write+0x192/0x5c0 [ 702.683223][T24767] ? splice_from_pipe_next+0x34f/0x3b0 [ 702.688730][T24767] ? kmalloc_array+0x2d/0x40 [ 702.693305][T24767] vfs_iter_write+0x4c/0x70 [ 702.697796][T24767] iter_file_splice_write+0x43a/0x790 [ 702.703167][T24767] ? splice_from_pipe+0xd0/0xd0 [ 702.708024][T24767] direct_splice_actor+0x80/0xa0 [ 702.712947][T24767] splice_direct_to_actor+0x345/0x650 [ 702.718311][T24767] ? do_splice_direct+0x190/0x190 [ 702.723344][T24767] do_splice_direct+0x106/0x190 [ 702.728308][T24767] do_sendfile+0x675/0xc40 [ 702.732707][T24767] __x64_sys_sendfile64+0x102/0x140 [ 702.737914][T24767] do_syscall_64+0x44/0xd0 [ 702.742394][T24767] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 702.748275][T24767] RIP: 0033:0x7fe1cb921ae9 [ 702.752673][T24767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 702.772264][T24767] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 702.780718][T24767] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 702.788672][T24767] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 702.796626][T24767] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 702.804730][T24767] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 11:03:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 28) [ 702.812685][T24767] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 702.820732][T24767] [ 702.895717][T24781] loop3: detected capacity change from 0 to 262160 [ 702.912153][T24781] FAULT_INJECTION: forcing a failure. [ 702.912153][T24781] name failslab, interval 1, probability 0, space 0, times 0 [ 702.924849][T24781] CPU: 0 PID: 24781 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 702.933612][T24781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.943665][T24781] Call Trace: [ 702.946944][T24781] [ 702.949879][T24781] dump_stack_lvl+0xd6/0x122 [ 702.954520][T24781] dump_stack+0x11/0x1b [ 702.958682][T24781] should_fail+0x23c/0x250 [ 702.963107][T24781] ? kmalloc_array+0x2d/0x40 [ 702.967742][T24781] __should_failslab+0x81/0x90 [ 702.972568][T24781] should_failslab+0x5/0x20 [ 702.977114][T24781] __kmalloc+0x6f/0x370 [ 702.981306][T24781] kmalloc_array+0x2d/0x40 [ 702.985723][T24781] iter_file_splice_write+0xd5/0x790 [ 702.991054][T24781] ? atime_needs_update+0x2ba/0x390 [ 702.996258][T24781] ? touch_atime+0x11f/0x2e0 [ 703.000843][T24781] ? generic_file_splice_read+0x2a9/0x330 [ 703.006583][T24781] ? splice_from_pipe+0xd0/0xd0 [ 703.011480][T24781] direct_splice_actor+0x80/0xa0 [ 703.016427][T24781] splice_direct_to_actor+0x345/0x650 [ 703.021868][T24781] ? do_splice_direct+0x190/0x190 [ 703.026922][T24781] do_splice_direct+0x106/0x190 [ 703.031774][T24781] do_sendfile+0x675/0xc40 [ 703.036251][T24781] __x64_sys_sendfile64+0x102/0x140 [ 703.041493][T24781] do_syscall_64+0x44/0xd0 [ 703.045913][T24781] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 703.051851][T24781] RIP: 0033:0x7fe1cb921ae9 [ 703.056283][T24781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 703.075882][T24781] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 703.084406][T24781] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 11:03:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000021) 11:03:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000300) 11:03:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a800) 11:03:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 29) [ 703.092371][T24781] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 703.100349][T24781] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 703.108324][T24781] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 703.116290][T24781] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 703.124315][T24781] [ 703.199256][T24784] loop5: detected capacity change from 0 to 262160 [ 703.211108][T24787] loop1: detected capacity change from 0 to 262160 [ 703.213242][T24788] loop0: detected capacity change from 0 to 262160 [ 703.243732][T24790] loop3: detected capacity change from 0 to 262160 11:03:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a900) [ 703.286823][T24790] FAULT_INJECTION: forcing a failure. [ 703.286823][T24790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 703.300146][T24790] CPU: 0 PID: 24790 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 703.308929][T24790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.318965][T24790] Call Trace: [ 703.322228][T24790] [ 703.325146][T24790] dump_stack_lvl+0xd6/0x122 [ 703.329860][T24790] dump_stack+0x11/0x1b [ 703.334018][T24790] should_fail+0x23c/0x250 [ 703.338463][T24790] __alloc_pages+0x102/0x330 [ 703.343074][T24790] alloc_pages+0x382/0x3d0 [ 703.347480][T24790] folio_alloc+0x1a/0x20 [ 703.351713][T24790] filemap_alloc_folio+0x53/0xf0 [ 703.356639][T24790] __filemap_get_folio+0x443/0x690 [ 703.361754][T24790] pagecache_get_page+0x26/0xe0 [ 703.367539][T24790] grab_cache_page_write_begin+0x3f/0x50 [ 703.373181][T24790] cont_write_begin+0x4ab/0x7b0 [ 703.378039][T24790] fat_write_begin+0x61/0xf0 [ 703.382631][T24790] ? fat_block_truncate_page+0x30/0x30 [ 703.388089][T24790] generic_perform_write+0x1c8/0x400 [ 703.393395][T24790] __generic_file_write_iter+0x195/0x2b0 [ 703.399055][T24790] ? generic_write_checks+0x250/0x290 [ 703.404455][T24790] generic_file_write_iter+0x75/0x130 [ 703.409849][T24790] do_iter_readv_writev+0x2de/0x380 [ 703.415150][T24790] do_iter_write+0x192/0x5c0 [ 703.419749][T24790] ? splice_from_pipe_next+0x34f/0x3b0 [ 703.425377][T24790] ? kmalloc_array+0x2d/0x40 [ 703.429969][T24790] vfs_iter_write+0x4c/0x70 [ 703.434493][T24790] iter_file_splice_write+0x43a/0x790 [ 703.439919][T24790] ? splice_from_pipe+0xd0/0xd0 [ 703.444832][T24790] direct_splice_actor+0x80/0xa0 [ 703.449828][T24790] splice_direct_to_actor+0x345/0x650 [ 703.455233][T24790] ? do_splice_direct+0x190/0x190 [ 703.460251][T24790] do_splice_direct+0x106/0x190 [ 703.465105][T24790] do_sendfile+0x675/0xc40 [ 703.469513][T24790] __x64_sys_sendfile64+0x102/0x140 [ 703.474702][T24790] do_syscall_64+0x44/0xd0 [ 703.479150][T24790] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 703.485052][T24790] RIP: 0033:0x7fe1cb921ae9 [ 703.489467][T24790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 703.509130][T24790] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 703.517802][T24790] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 703.525842][T24790] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 703.533807][T24790] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 703.541820][T24790] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 703.549775][T24790] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 703.557736][T24790] [ 703.603158][T24797] loop0: detected capacity change from 0 to 262160 11:03:20 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000b01) 11:03:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000500) 11:03:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000022) 11:03:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 30) 11:03:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, 0xfffffffffffffffd, 0x0) add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r2 = geteuid() setresuid(r2, 0x0, 0xffffffffffffffff) r3 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x27, 0x2f, 0x22, 0x24, 0x1e, 0x10, 0x3b, 0x28]}, 0x10, r0) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x1c243911) keyctl$chown(0x4, r4, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r4, 0xffffffffffffffff, r5) keyctl$get_security(0x11, r4, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000000580)={&(0x7f0000000100), 0x6e, &(0x7f0000000480)=[{&(0x7f00000001c0)=""/37, 0x25}, {&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f0000000240)=""/67, 0x43}, {&(0x7f00000002c0)=""/253, 0xfd}, {&(0x7f00000003c0)=""/175, 0xaf}], 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="24000000000000590100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000a55439aa00340000fdffffff0001400000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x80}, 0x20041) getgid() add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000600)={'fscrypt:', @auto=[0x33, 0x30, 0x62, 0x37, 0x34, 0x36, 0x35, 0x66, 0x37, 0x35, 0x30, 0x33, 0x64, 0x37, 0x32, 0x65]}, &(0x7f0000000640)={0x0, "e5e92eaefc7d4502a5fa305c5b9c17c4139763c40b70d7db0d8d942499ea23a1f7dce72b4aa945c5b88890a196cc0c0412f66ec2214e87a4421d15b526565d1c", 0x27}, 0x48, r0) geteuid() keyctl$chown(0x4, r3, r2, r6) 11:03:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000aa00) [ 703.683054][T24802] loop3: detected capacity change from 0 to 262160 [ 703.688935][T24807] loop5: detected capacity change from 0 to 262160 [ 703.695065][T24806] loop0: detected capacity change from 0 to 262160 [ 703.697975][T24810] loop1: detected capacity change from 0 to 262160 11:03:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) recvmsg$unix(r1, &(0x7f0000001680)={&(0x7f0000000040), 0x6e, &(0x7f0000001540)=[{&(0x7f00000001c0)=""/253, 0xfd}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/225, 0xe1}, {&(0x7f00000000c0)=""/72, 0x48}, {&(0x7f0000000140)=""/16, 0x10}], 0x5, &(0x7f0000001840)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200000043c9b249d09d4c885f7c4b2ed2cdb720ba43312aa6f34d6ddf66e1e12c5916811b992fee93", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x90}, 0x21) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r8 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="0000f103c10000", @ANYRESHEX=r7, @ANYBLOB='\x00\x00']) keyctl$setperm(0x5, 0x0, 0x1c243911) keyctl$chown(0x4, 0x0, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r9) keyctl$get_security(0x11, 0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, r2, r7) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f00000004c0)={[{@fat=@gid={'gid', 0x3d, r11}}]}) statx(r8, &(0x7f0000001700)='./file0\x00', 0x100, 0x4, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r4, r5, r12) [ 703.728505][T24802] FAULT_INJECTION: forcing a failure. [ 703.728505][T24802] name failslab, interval 1, probability 0, space 0, times 0 [ 703.741119][T24802] CPU: 1 PID: 24802 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 703.749886][T24802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.759964][T24802] Call Trace: [ 703.763329][T24802] [ 703.766316][T24802] dump_stack_lvl+0xd6/0x122 [ 703.770972][T24802] dump_stack+0x11/0x1b [ 703.775281][T24802] should_fail+0x23c/0x250 [ 703.779774][T24802] ? xas_create+0x94b/0xb10 [ 703.784355][T24802] __should_failslab+0x81/0x90 [ 703.789269][T24802] should_failslab+0x5/0x20 [ 703.793782][T24802] kmem_cache_alloc+0x4f/0x320 [ 703.798559][T24802] xas_create+0x94b/0xb10 [ 703.802964][T24802] xas_store+0x70/0xca0 [ 703.807156][T24802] ? xas_find_conflict+0x422/0x4c0 [ 703.812387][T24802] __filemap_add_folio+0x1e8/0x4d0 [ 703.817514][T24802] ? workingset_activation+0x2b0/0x2b0 [ 703.822979][T24802] filemap_add_folio+0x6b/0x150 [ 703.827879][T24802] __filemap_get_folio+0x4c4/0x690 [ 703.833036][T24802] pagecache_get_page+0x26/0xe0 [ 703.837917][T24802] grab_cache_page_write_begin+0x3f/0x50 [ 703.843560][T24802] cont_write_begin+0x4ab/0x7b0 [ 703.848418][T24802] fat_write_begin+0x61/0xf0 [ 703.853064][T24802] ? fat_block_truncate_page+0x30/0x30 [ 703.858540][T24802] generic_perform_write+0x1c8/0x400 [ 703.863833][T24802] __generic_file_write_iter+0x195/0x2b0 [ 703.869572][T24802] ? generic_write_checks+0x250/0x290 [ 703.875013][T24802] generic_file_write_iter+0x75/0x130 [ 703.880422][T24802] do_iter_readv_writev+0x2de/0x380 [ 703.885716][T24802] do_iter_write+0x192/0x5c0 [ 703.890360][T24802] ? splice_from_pipe_next+0x34f/0x3b0 [ 703.895849][T24802] ? kmalloc_array+0x2d/0x40 [ 703.900450][T24802] vfs_iter_write+0x4c/0x70 [ 703.904955][T24802] iter_file_splice_write+0x43a/0x790 [ 703.910471][T24802] ? splice_from_pipe+0xd0/0xd0 [ 703.915329][T24802] direct_splice_actor+0x80/0xa0 [ 703.920284][T24802] splice_direct_to_actor+0x345/0x650 [ 703.925660][T24802] ? do_splice_direct+0x190/0x190 [ 703.930728][T24802] do_splice_direct+0x106/0x190 [ 703.935653][T24802] do_sendfile+0x675/0xc40 [ 703.940095][T24802] __x64_sys_sendfile64+0x102/0x140 [ 703.945299][T24802] do_syscall_64+0x44/0xd0 [ 703.949719][T24802] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 703.955726][T24802] RIP: 0033:0x7fe1cb921ae9 [ 703.960141][T24802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 703.979772][T24802] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 703.988273][T24802] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 703.996291][T24802] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 704.004315][T24802] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 704.007719][T24816] FAT-fs (loop2): bogus number of reserved sectors [ 704.012283][T24802] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 704.018847][T24816] FAT-fs (loop2): Can't find a valid FAT filesystem 11:03:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000ab00) 11:03:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000600) 11:03:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000023) [ 704.026783][T24802] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 704.026804][T24802] [ 704.069095][T24821] loop5: detected capacity change from 0 to 262160 [ 704.076267][T24824] loop1: detected capacity change from 0 to 262160 11:03:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 31) [ 704.077071][T24825] loop0: detected capacity change from 0 to 262160 11:03:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000024) [ 704.130800][T24829] FAT-fs (loop2): bogus number of reserved sectors [ 704.137430][T24829] FAT-fs (loop2): Can't find a valid FAT filesystem [ 704.152336][T24831] loop3: detected capacity change from 0 to 262160 [ 704.170666][T24831] FAULT_INJECTION: forcing a failure. [ 704.170666][T24831] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 704.184084][T24831] CPU: 1 PID: 24831 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 704.192919][T24831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.202974][T24831] Call Trace: [ 704.206250][T24831] [ 704.209179][T24831] dump_stack_lvl+0xd6/0x122 [ 704.213781][T24831] dump_stack+0x11/0x1b [ 704.218008][T24831] should_fail+0x23c/0x250 [ 704.222419][T24831] __alloc_pages+0x102/0x330 [ 704.227050][T24831] alloc_pages+0x382/0x3d0 [ 704.231555][T24831] folio_alloc+0x1a/0x20 [ 704.235800][T24831] filemap_alloc_folio+0x53/0xf0 [ 704.240738][T24831] __filemap_get_folio+0x443/0x690 [ 704.245932][T24831] pagecache_get_page+0x26/0xe0 [ 704.250794][T24831] grab_cache_page_write_begin+0x3f/0x50 [ 704.256566][T24831] cont_write_begin+0x4ab/0x7b0 [ 704.261427][T24831] fat_write_begin+0x61/0xf0 [ 704.266022][T24831] ? fat_block_truncate_page+0x30/0x30 [ 704.271501][T24831] generic_perform_write+0x1c8/0x400 [ 704.276803][T24831] ? fat_write_begin+0xf0/0xf0 [ 704.281611][T24831] __generic_file_write_iter+0x195/0x2b0 [ 704.287324][T24831] ? generic_write_checks+0x250/0x290 [ 704.292694][T24831] generic_file_write_iter+0x75/0x130 [ 704.298148][T24831] do_iter_readv_writev+0x2de/0x380 [ 704.303432][T24831] do_iter_write+0x192/0x5c0 [ 704.308071][T24831] ? splice_from_pipe_next+0x34f/0x3b0 [ 704.313529][T24831] ? kmalloc_array+0x2d/0x40 [ 704.318182][T24831] vfs_iter_write+0x4c/0x70 [ 704.322716][T24831] iter_file_splice_write+0x43a/0x790 [ 704.328095][T24831] ? splice_from_pipe+0xd0/0xd0 [ 704.332945][T24831] direct_splice_actor+0x80/0xa0 [ 704.337949][T24831] splice_direct_to_actor+0x345/0x650 [ 704.343326][T24831] ? do_splice_direct+0x190/0x190 [ 704.348418][T24831] do_splice_direct+0x106/0x190 [ 704.353277][T24831] do_sendfile+0x675/0xc40 [ 704.357732][T24831] __x64_sys_sendfile64+0x102/0x140 [ 704.362990][T24831] do_syscall_64+0x44/0xd0 [ 704.367405][T24831] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 704.373312][T24831] RIP: 0033:0x7fe1cb921ae9 [ 704.377723][T24831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.395045][T24834] loop1: detected capacity change from 0 to 262160 [ 704.397497][T24831] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 704.412397][T24831] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 704.420423][T24831] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 704.428488][T24831] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 704.436491][T24831] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 704.444505][T24831] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 704.452474][T24831] 11:03:21 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000c01) 11:03:21 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000ac00) 11:03:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000700) 11:03:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) r5 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "0f1ecbd9a34213932f2022ee7caae9459665a7d3d7322da4e47f5e1734310753bddc00f302362f3ba97bf5bcffde82d242300386ae43a5bb4f32c612ff75d848", 0x25}, 0x48, r4) r6 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r6, r2, 0x0) r7 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r5) add_key$user(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="cd74fe6cf567adf54a712e6fe883de241ddbd2488be74c08446db46f06ef09f4860c551614b55ce302497f29797eaacc9d7e675c53c60c9b7b9a5cfb6012da72266c1fca39839ae3f35a6432c59034b7e28dd16bd64923a3548ad08f61e38af64fa616aa6cc3618f817f02f436a521f3b923a771edbdfbdff6a4b568e0533b6febddb55ca817e0ca982429225e3ee2860a0c4d86a73d98e9f0716a32f5005677baa55c5ffc2c33f7efc21c292844341c7a97a75d47193dcd24efd66afa2393076cd43d0bb42f994e8a21a9c70093292f73d306bd0dbb5aee66644fa439878431bda18df5a7651101", 0xe8, r7) 11:03:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000025) 11:03:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 32) 11:03:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x1c243911) keyctl$chown(0x4, r5, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r5, 0xffffffffffffffff, r6) keyctl$get_security(0x11, r5, 0x0, 0x0) keyctl$get_security(0x11, r5, &(0x7f0000000040)=""/174, 0xae) keyctl$chown(0x4, r4, r2, 0x0) [ 704.752920][T24840] loop5: detected capacity change from 0 to 262160 [ 704.759012][T24844] loop0: detected capacity change from 0 to 262160 [ 704.761519][T24843] loop3: detected capacity change from 0 to 262160 [ 704.767679][T24845] loop1: detected capacity change from 0 to 262160 [ 704.793811][T24843] FAULT_INJECTION: forcing a failure. [ 704.793811][T24843] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 704.807071][T24843] CPU: 0 PID: 24843 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 704.815841][T24843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.825896][T24843] Call Trace: [ 704.829199][T24843] [ 704.832134][T24843] dump_stack_lvl+0xd6/0x122 [ 704.836937][T24843] dump_stack+0x11/0x1b [ 704.841101][T24843] should_fail+0x23c/0x250 [ 704.845627][T24843] __alloc_pages+0x102/0x330 [ 704.850229][T24843] alloc_pages+0x382/0x3d0 [ 704.854638][T24843] folio_alloc+0x1a/0x20 [ 704.858892][T24843] filemap_alloc_folio+0x53/0xf0 [ 704.863914][T24843] __filemap_get_folio+0x443/0x690 [ 704.869034][T24843] pagecache_get_page+0x26/0xe0 [ 704.873970][T24843] grab_cache_page_write_begin+0x3f/0x50 [ 704.879676][T24843] cont_write_begin+0x4ab/0x7b0 [ 704.884567][T24843] fat_write_begin+0x61/0xf0 [ 704.889224][T24843] ? fat_block_truncate_page+0x30/0x30 [ 704.894744][T24843] generic_perform_write+0x1c8/0x400 [ 704.900125][T24843] ? fat_write_begin+0xf0/0xf0 [ 704.904943][T24843] __generic_file_write_iter+0x195/0x2b0 [ 704.910579][T24843] ? generic_write_checks+0x250/0x290 [ 704.915955][T24843] generic_file_write_iter+0x75/0x130 [ 704.921332][T24843] do_iter_readv_writev+0x2de/0x380 [ 704.926559][T24843] do_iter_write+0x192/0x5c0 [ 704.931159][T24843] vfs_iter_write+0x4c/0x70 [ 704.935741][T24843] iter_file_splice_write+0x43a/0x790 [ 704.941185][T24843] ? splice_from_pipe+0xd0/0xd0 [ 704.946198][T24843] direct_splice_actor+0x80/0xa0 [ 704.951147][T24843] splice_direct_to_actor+0x345/0x650 [ 704.956583][T24843] ? do_splice_direct+0x190/0x190 [ 704.961628][T24843] do_splice_direct+0x106/0x190 [ 704.966484][T24843] do_sendfile+0x675/0xc40 [ 704.970972][T24843] __x64_sys_sendfile64+0x102/0x140 [ 704.976240][T24843] do_syscall_64+0x44/0xd0 [ 704.980666][T24843] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 704.986597][T24843] RIP: 0033:0x7fe1cb921ae9 [ 704.991006][T24843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.010609][T24843] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 705.019362][T24843] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 705.027426][T24843] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 705.035396][T24843] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 705.043377][T24843] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 11:03:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000900) 11:03:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x7b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r4, r2, r5) 11:03:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000026) [ 705.051430][T24843] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 705.059420][T24843] 11:03:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='keyring\x00', 0xfffffffffffffff9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r4) keyctl$get_security(0x11, r2, &(0x7f0000000200)=""/50, 0x32) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x1c243911) keyctl$chown(0x4, r5, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000240)}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="5c0000002100000028bd7000fedbdf25021410fa7f000007090000000800010064010102050013000200000008000b0056130000080002007f0000011400030076657468315f766972745f77690000000100"/92], 0x5c}, 0x1, 0x0, 0x0, 0x1001}, 0x4000) keyctl$chown(0x4, r5, 0xffffffffffffffff, r6) keyctl$get_security(0x11, r5, 0x0, 0x0) keyctl$setperm(0x5, r5, 0x14080016) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getpeername(r8, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f00000001c0)=0x80) r9 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r9, r3, 0x0) 11:03:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 33) [ 705.112478][T24863] loop5: detected capacity change from 0 to 262160 [ 705.126555][T24866] loop1: detected capacity change from 0 to 262160 [ 705.186255][T24872] loop3: detected capacity change from 0 to 262160 [ 705.200552][T24872] FAULT_INJECTION: forcing a failure. [ 705.200552][T24872] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 705.213875][T24872] CPU: 0 PID: 24872 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 705.222641][T24872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.232701][T24872] Call Trace: [ 705.236038][T24872] [ 705.238961][T24872] dump_stack_lvl+0xd6/0x122 [ 705.243684][T24872] dump_stack+0x11/0x1b [ 705.247871][T24872] should_fail+0x23c/0x250 [ 705.252504][T24872] __alloc_pages+0x102/0x330 [ 705.257143][T24872] alloc_pages+0x382/0x3d0 [ 705.261558][T24872] folio_alloc+0x1a/0x20 [ 705.265825][T24872] filemap_alloc_folio+0x53/0xf0 [ 705.270761][T24872] __filemap_get_folio+0x443/0x690 [ 705.275862][T24872] pagecache_get_page+0x26/0xe0 [ 705.280693][T24872] grab_cache_page_write_begin+0x3f/0x50 [ 705.286353][T24872] cont_write_begin+0x4ab/0x7b0 [ 705.291199][T24872] fat_write_begin+0x61/0xf0 [ 705.295856][T24872] ? fat_block_truncate_page+0x30/0x30 [ 705.301304][T24872] generic_perform_write+0x1c8/0x400 [ 705.306630][T24872] ? fat_write_begin+0xf0/0xf0 [ 705.311725][T24872] __generic_file_write_iter+0x195/0x2b0 [ 705.317386][T24872] ? generic_write_checks+0x250/0x290 [ 705.322832][T24872] generic_file_write_iter+0x75/0x130 [ 705.328298][T24872] do_iter_readv_writev+0x2de/0x380 [ 705.333497][T24872] do_iter_write+0x192/0x5c0 [ 705.338087][T24872] ? splice_from_pipe_next+0x34f/0x3b0 [ 705.343643][T24872] ? kmalloc_array+0x2d/0x40 [ 705.348225][T24872] vfs_iter_write+0x4c/0x70 [ 705.352774][T24872] iter_file_splice_write+0x43a/0x790 [ 705.358128][T24872] ? splice_from_pipe+0xd0/0xd0 [ 705.363211][T24872] direct_splice_actor+0x80/0xa0 [ 705.368143][T24872] splice_direct_to_actor+0x345/0x650 [ 705.373548][T24872] ? do_splice_direct+0x190/0x190 [ 705.378621][T24872] do_splice_direct+0x106/0x190 [ 705.383594][T24872] do_sendfile+0x675/0xc40 [ 705.387988][T24872] __x64_sys_sendfile64+0x102/0x140 [ 705.393218][T24872] do_syscall_64+0x44/0xd0 [ 705.397674][T24872] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 705.403561][T24872] RIP: 0033:0x7fe1cb921ae9 [ 705.407957][T24872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.427592][T24872] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 705.436005][T24872] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 705.444134][T24872] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 705.452112][T24872] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 705.460121][T24872] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 705.468086][T24872] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 705.476224][T24872] 11:03:22 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000d01) 11:03:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000ad00) 11:03:22 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x7800, 0x80, 0x1f, 0x4, {{0x2a, 0x4, 0x0, 0x2, 0xa8, 0x67, 0x0, 0x1f, 0x29, 0x0, @multicast2, @private=0xa010100, {[@cipso={0x86, 0x33, 0x3, [{0x6, 0xa, "019e4d5628328c8d"}, {0x0, 0xe, "1358e654ce32435933358353"}, {0x0, 0xf, "52bdb6954d57f3a41aa8357b06"}, {0x5, 0x6, "0ef42c8d"}]}, @timestamp_addr={0x44, 0xc, 0xc8, 0x1, 0x3, [{@local, 0x1f}]}, @rr={0x7, 0x13, 0x16, [@remote, @local, @broadcast, @multicast2]}, @timestamp={0x44, 0x10, 0xe7, 0x0, 0x4, [0x8, 0x5, 0x4]}, @rr={0x7, 0x7, 0xd, [@empty]}, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x23, 0xaf, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @empty, @multicast2, @private=0xa010101, @local, @remote]}]}}}}}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x3, 0x4, 0x4, 0x10001, 0x870, 0xffffffffffffffff, 0x3, '\x00', r1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001800)={r2, &(0x7f0000001740), 0x0}, 0x20) r3 = socket(0x10, 0x2, 0x0) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000001c0)='big_key\x00', 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r5 = dup2(r4, r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0xc0182101, &(0x7f00000001c0)={r6}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r5, &(0x7f0000000200)="5b57b577901cba5e469b364971c77f85e185b45c36da78491801f79ad57ae40a43793243b5b22b2e7ac0a66355f665ea48b952e26a72e4fdc4f36557779195a52a6c083bab47cd419e01849e2c6964a66cfbe4b0f0a09706", &(0x7f0000000280)=""/192, 0x4}, 0x20) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r8) r9 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r9, r7, 0x0) 11:03:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000027) 11:03:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000a00) 11:03:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 34) [ 705.585861][T24880] loop5: detected capacity change from 0 to 262160 [ 705.588594][T24883] loop1: detected capacity change from 0 to 262160 [ 705.594392][T24882] loop3: detected capacity change from 0 to 262160 [ 705.599319][T24884] loop0: detected capacity change from 0 to 262160 [ 705.624497][T24882] FAULT_INJECTION: forcing a failure. [ 705.624497][T24882] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 705.637760][T24882] CPU: 0 PID: 24882 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 705.646528][T24882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.656611][T24882] Call Trace: [ 705.659918][T24882] [ 705.662837][T24882] dump_stack_lvl+0xd6/0x122 [ 705.667506][T24882] dump_stack+0x11/0x1b [ 705.671733][T24882] should_fail+0x23c/0x250 [ 705.676153][T24882] __alloc_pages+0x102/0x330 [ 705.680782][T24882] alloc_pages+0x382/0x3d0 [ 705.685256][T24882] folio_alloc+0x1a/0x20 [ 705.689499][T24882] filemap_alloc_folio+0x53/0xf0 [ 705.694438][T24882] __filemap_get_folio+0x443/0x690 [ 705.699577][T24882] pagecache_get_page+0x26/0xe0 [ 705.704433][T24882] grab_cache_page_write_begin+0x3f/0x50 [ 705.710067][T24882] cont_write_begin+0x4ab/0x7b0 [ 705.714920][T24882] fat_write_begin+0x61/0xf0 [ 705.719569][T24882] ? fat_block_truncate_page+0x30/0x30 [ 705.725040][T24882] generic_perform_write+0x1c8/0x400 [ 705.730332][T24882] ? fat_write_begin+0xf0/0xf0 [ 705.735100][T24882] __generic_file_write_iter+0x195/0x2b0 [ 705.740770][T24882] ? generic_write_checks+0x250/0x290 [ 705.746196][T24882] generic_file_write_iter+0x75/0x130 [ 705.751596][T24882] do_iter_readv_writev+0x2de/0x380 [ 705.756845][T24882] do_iter_write+0x192/0x5c0 [ 705.761431][T24882] ? splice_from_pipe_next+0x34f/0x3b0 [ 705.766886][T24882] ? kmalloc_array+0x2d/0x40 [ 705.771545][T24882] vfs_iter_write+0x4c/0x70 [ 705.776179][T24882] iter_file_splice_write+0x43a/0x790 [ 705.781564][T24882] ? splice_from_pipe+0xd0/0xd0 [ 705.786409][T24882] direct_splice_actor+0x80/0xa0 [ 705.791355][T24882] splice_direct_to_actor+0x345/0x650 [ 705.796728][T24882] ? do_splice_direct+0x190/0x190 [ 705.801756][T24882] do_splice_direct+0x106/0x190 [ 705.806666][T24882] do_sendfile+0x675/0xc40 [ 705.811131][T24882] __x64_sys_sendfile64+0x102/0x140 [ 705.816331][T24882] do_syscall_64+0x44/0xd0 [ 705.820807][T24882] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 705.826713][T24882] RIP: 0033:0x7fe1cb921ae9 [ 705.831172][T24882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.850800][T24882] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 705.859300][T24882] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 705.867297][T24882] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 705.875327][T24882] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 11:03:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000b00) 11:03:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000028) 11:03:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000ae00) 11:03:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 35) [ 705.883294][T24882] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 705.891278][T24882] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 705.899338][T24882] [ 705.953870][T24894] loop5: detected capacity change from 0 to 262160 [ 705.970550][T24896] loop0: detected capacity change from 0 to 262160 [ 705.979598][T24900] loop1: detected capacity change from 0 to 262160 [ 705.996462][T24901] loop3: detected capacity change from 0 to 262160 11:03:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000af00) 11:03:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000c00) [ 706.064978][T24901] FAULT_INJECTION: forcing a failure. [ 706.064978][T24901] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 706.078287][T24901] CPU: 0 PID: 24901 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 706.087059][T24901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.097277][T24901] Call Trace: [ 706.100540][T24901] [ 706.103624][T24901] dump_stack_lvl+0xd6/0x122 [ 706.108284][T24901] dump_stack+0x11/0x1b [ 706.112424][T24901] should_fail+0x23c/0x250 [ 706.116911][T24901] __alloc_pages+0x102/0x330 [ 706.121575][T24901] alloc_pages+0x382/0x3d0 [ 706.126057][T24901] folio_alloc+0x1a/0x20 [ 706.130299][T24901] filemap_alloc_folio+0x53/0xf0 [ 706.135233][T24901] __filemap_get_folio+0x443/0x690 [ 706.140350][T24901] pagecache_get_page+0x26/0xe0 [ 706.145227][T24901] grab_cache_page_write_begin+0x3f/0x50 [ 706.150841][T24901] cont_write_begin+0x4ab/0x7b0 [ 706.155832][T24901] fat_write_begin+0x61/0xf0 [ 706.160518][T24901] ? fat_block_truncate_page+0x30/0x30 [ 706.166060][T24901] generic_perform_write+0x1c8/0x400 [ 706.171373][T24901] ? fat_write_begin+0xf0/0xf0 [ 706.176167][T24901] __generic_file_write_iter+0x195/0x2b0 [ 706.181781][T24901] ? generic_write_checks+0x250/0x290 [ 706.187178][T24901] generic_file_write_iter+0x75/0x130 [ 706.192533][T24901] do_iter_readv_writev+0x2de/0x380 [ 706.197711][T24901] do_iter_write+0x192/0x5c0 [ 706.202286][T24901] ? splice_from_pipe_next+0x34f/0x3b0 [ 706.207807][T24901] ? kmalloc_array+0x2d/0x40 [ 706.212446][T24901] vfs_iter_write+0x4c/0x70 [ 706.216999][T24901] iter_file_splice_write+0x43a/0x790 [ 706.222396][T24901] ? splice_from_pipe+0xd0/0xd0 [ 706.227300][T24901] direct_splice_actor+0x80/0xa0 [ 706.232220][T24901] splice_direct_to_actor+0x345/0x650 [ 706.237635][T24901] ? do_splice_direct+0x190/0x190 [ 706.242708][T24901] do_splice_direct+0x106/0x190 [ 706.247537][T24901] do_sendfile+0x675/0xc40 [ 706.252004][T24901] __x64_sys_sendfile64+0x102/0x140 [ 706.257226][T24901] do_syscall_64+0x44/0xd0 [ 706.261689][T24901] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 706.267596][T24901] RIP: 0033:0x7fe1cb921ae9 [ 706.271990][T24901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 706.291633][T24901] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 706.300087][T24901] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 706.308119][T24901] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 706.316069][T24901] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 706.324020][T24901] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 706.331975][T24901] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 706.339969][T24901] [ 706.371281][T24907] loop5: detected capacity change from 0 to 262160 [ 706.374295][T24908] loop0: detected capacity change from 0 to 262160 11:03:23 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000e01) 11:03:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000029) [ 706.476790][T24915] loop1: detected capacity change from 0 to 262160 11:03:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='syz', r5) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r7, 0x1c243911) keyctl$chown(0x4, r7, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r7, 0xffffffffffffffff, r8) keyctl$get_security(0x11, r7, 0x0, 0x0) r9 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$reject(0x13, r7, 0x2, 0x10001, r9) keyctl$chown(0x4, r4, r2, 0x0) 11:03:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000d00) 11:03:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 36) 11:03:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b000) 11:03:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002a) 11:03:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair(0x1, 0x6, 0xff, &(0x7f0000000100)={0xffffffffffffffff}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r7}) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r9 = dup2(r8, r8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r9, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r9, 0xc0182101, &(0x7f00000001c0)={r10}) r11 = creat(&(0x7f0000000400)='./file0\x00', 0x11) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x90, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r4}, {0x8, 0x1, r6}, {0x8}, {0x8, 0x1, r9}, {0x8, 0x1, r1}, {0x8, 0x1, r11}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x401}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x10000}]}, 0x90}, 0x1, 0x0, 0x0, 0x5}, 0x4008) keyctl$chown(0x4, 0x0, 0xee00, r3) r12 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r13 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r13, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) keyctl$chown(0x4, r12, r2, 0x0) [ 706.593993][T24923] loop3: detected capacity change from 0 to 262160 [ 706.594155][T24924] loop0: detected capacity change from 0 to 262160 [ 706.608948][T24925] loop5: detected capacity change from 0 to 262160 [ 706.621094][T24927] loop1: detected capacity change from 0 to 262160 11:03:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002b) 11:03:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b100) 11:03:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000e00) [ 706.677456][T24923] FAULT_INJECTION: forcing a failure. [ 706.677456][T24923] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 706.690737][T24923] CPU: 0 PID: 24923 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 706.699589][T24923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.709644][T24923] Call Trace: [ 706.712957][T24923] [ 706.715908][T24923] dump_stack_lvl+0xd6/0x122 [ 706.720535][T24923] dump_stack+0x11/0x1b [ 706.724713][T24923] should_fail+0x23c/0x250 [ 706.729117][T24923] __alloc_pages+0x102/0x330 [ 706.733753][T24923] alloc_pages+0x382/0x3d0 [ 706.738151][T24923] folio_alloc+0x1a/0x20 [ 706.742370][T24923] filemap_alloc_folio+0x53/0xf0 [ 706.747286][T24923] __filemap_get_folio+0x443/0x690 [ 706.752386][T24923] pagecache_get_page+0x26/0xe0 [ 706.757231][T24923] grab_cache_page_write_begin+0x3f/0x50 [ 706.762905][T24923] cont_write_begin+0x4ab/0x7b0 [ 706.767814][T24923] fat_write_begin+0x61/0xf0 [ 706.772470][T24923] ? fat_block_truncate_page+0x30/0x30 [ 706.778316][T24923] generic_perform_write+0x1c8/0x400 [ 706.783636][T24923] ? fat_write_begin+0xf0/0xf0 [ 706.788393][T24923] __generic_file_write_iter+0x195/0x2b0 [ 706.794120][T24923] ? generic_write_checks+0x250/0x290 [ 706.799479][T24923] generic_file_write_iter+0x75/0x130 [ 706.804864][T24923] do_iter_readv_writev+0x2de/0x380 [ 706.810079][T24923] do_iter_write+0x192/0x5c0 [ 706.814664][T24923] ? splice_from_pipe_next+0x34f/0x3b0 [ 706.820114][T24923] ? kmalloc_array+0x2d/0x40 [ 706.824726][T24923] vfs_iter_write+0x4c/0x70 [ 706.829227][T24923] iter_file_splice_write+0x43a/0x790 [ 706.834582][T24923] ? splice_from_pipe+0xd0/0xd0 [ 706.839418][T24923] direct_splice_actor+0x80/0xa0 [ 706.844585][T24923] splice_direct_to_actor+0x345/0x650 [ 706.849941][T24923] ? do_splice_direct+0x190/0x190 [ 706.854961][T24923] do_splice_direct+0x106/0x190 [ 706.859882][T24923] do_sendfile+0x675/0xc40 [ 706.864316][T24923] __x64_sys_sendfile64+0x102/0x140 [ 706.869501][T24923] do_syscall_64+0x44/0xd0 [ 706.873900][T24923] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 706.879788][T24923] RIP: 0033:0x7fe1cb921ae9 [ 706.884336][T24923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 706.904046][T24923] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 706.912494][T24923] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 706.920445][T24923] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 11:03:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 37) [ 706.928392][T24923] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 706.936391][T24923] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 706.944338][T24923] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 706.952324][T24923] 11:03:23 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000f01) 11:03:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b200) [ 706.999906][T24939] loop0: detected capacity change from 0 to 262160 [ 707.023142][T24943] loop5: detected capacity change from 0 to 262160 [ 707.030219][T24944] loop1: detected capacity change from 0 to 262160 [ 707.046916][T24949] loop3: detected capacity change from 0 to 262160 [ 707.066897][T24949] FAULT_INJECTION: forcing a failure. [ 707.066897][T24949] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 707.080314][T24949] CPU: 1 PID: 24949 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 707.089104][T24949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:03:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002c) [ 707.099164][T24949] Call Trace: [ 707.102510][T24949] [ 707.105433][T24949] dump_stack_lvl+0xd6/0x122 [ 707.110035][T24949] dump_stack+0x11/0x1b [ 707.115093][T24949] should_fail+0x23c/0x250 [ 707.119537][T24949] __alloc_pages+0x102/0x330 [ 707.124139][T24949] alloc_pages+0x382/0x3d0 [ 707.128559][T24949] folio_alloc+0x1a/0x20 [ 707.132888][T24949] filemap_alloc_folio+0x53/0xf0 [ 707.137906][T24949] __filemap_get_folio+0x443/0x690 [ 707.143034][T24949] pagecache_get_page+0x26/0xe0 [ 707.147887][T24949] grab_cache_page_write_begin+0x3f/0x50 [ 707.153519][T24949] cont_write_begin+0x4ab/0x7b0 [ 707.158546][T24949] fat_write_begin+0x61/0xf0 [ 707.163306][T24949] ? fat_block_truncate_page+0x30/0x30 [ 707.168773][T24949] generic_perform_write+0x1c8/0x400 [ 707.174479][T24949] ? fat_write_begin+0xf0/0xf0 [ 707.179312][T24949] __generic_file_write_iter+0x195/0x2b0 [ 707.184954][T24949] ? generic_write_checks+0x250/0x290 [ 707.190417][T24949] generic_file_write_iter+0x75/0x130 [ 707.195812][T24949] do_iter_readv_writev+0x2de/0x380 [ 707.201005][T24949] do_iter_write+0x192/0x5c0 [ 707.205629][T24949] ? splice_from_pipe_next+0x34f/0x3b0 [ 707.211085][T24949] ? kmalloc_array+0x2d/0x40 [ 707.215735][T24949] vfs_iter_write+0x4c/0x70 [ 707.220249][T24949] iter_file_splice_write+0x43a/0x790 [ 707.225640][T24949] ? splice_from_pipe+0xd0/0xd0 [ 707.230595][T24949] direct_splice_actor+0x80/0xa0 [ 707.235539][T24949] splice_direct_to_actor+0x345/0x650 [ 707.240958][T24949] ? do_splice_direct+0x190/0x190 [ 707.246024][T24949] do_splice_direct+0x106/0x190 [ 707.250909][T24949] do_sendfile+0x675/0xc40 [ 707.255314][T24949] __x64_sys_sendfile64+0x102/0x140 [ 707.260519][T24949] do_syscall_64+0x44/0xd0 [ 707.264924][T24949] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 707.270823][T24949] RIP: 0033:0x7fe1cb921ae9 [ 707.275267][T24949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.295053][T24949] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 707.303888][T24949] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 707.311844][T24949] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 707.319802][T24949] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.327787][T24949] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 707.335745][T24949] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 707.343767][T24949] [ 707.347284][ T24] kauditd_printk_skb: 3739 callbacks suppressed [ 707.347294][ T24] audit: type=1326 audit(1638788603.969:1071639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24931 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f0000000040), &(0x7f0000001400)={'syz', 0x2}, &(0x7f00000001c0)="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", 0x2, r0) keyctl$chown(0x4, r4, r2, 0x0) 11:03:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000f00) 11:03:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 38) 11:03:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@ipv6_newnexthop={0x18, 0x4e, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x4}}, 0x18}}, 0x0) r5 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r5, r2, 0x0) 11:03:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x1c243911) keyctl$chown(0x4, r2, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) r4 = geteuid() keyctl$chown(0x4, r2, r4, r3) keyctl$get_security(0x11, r2, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$unlink(0x9, r5, r2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r7) r8 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r8, r6, 0x0) [ 707.377935][ T24] audit: type=1326 audit(1638788603.969:1071640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24931 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 707.404088][T24956] loop0: detected capacity change from 0 to 262160 [ 707.431929][T24961] loop1: detected capacity change from 0 to 262160 [ 707.444956][T24964] loop5: detected capacity change from 0 to 262160 11:03:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b300) 11:03:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x1c243911) keyctl$chown(0x4, r1, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r1, 0xffffffffffffffff, r2) keyctl$get_security(0x11, r1, 0x0, 0x0) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='user\x00', r1) r3 = socket(0x10, 0xa, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r5) socket(0x22, 0x6, 0x6aaa) keyctl$get_security(0x11, r0, &(0x7f0000000040)=""/45, 0x2d) r6 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x4, r6, r4, 0x0) 11:03:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001100) 11:03:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x1c243911) keyctl$chown(0x4, r4, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r4, 0xffffffffffffffff, r5) keyctl$get_security(0x11, r4, 0x0, 0x0) keyctl$chown(0x4, r4, r2, r3) [ 707.490960][T24972] loop3: detected capacity change from 0 to 262160 [ 707.526156][T24978] loop0: detected capacity change from 0 to 262160 [ 707.557220][T24972] FAULT_INJECTION: forcing a failure. [ 707.557220][T24972] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 707.570590][T24972] CPU: 0 PID: 24972 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 707.579364][T24972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.589423][T24972] Call Trace: [ 707.592732][T24972] [ 707.595752][T24972] dump_stack_lvl+0xd6/0x122 [ 707.599566][T24984] loop5: detected capacity change from 0 to 262160 [ 707.600390][T24972] dump_stack+0x11/0x1b [ 707.611062][T24972] should_fail+0x23c/0x250 [ 707.615492][T24972] __alloc_pages+0x102/0x330 [ 707.620109][T24972] alloc_pages+0x382/0x3d0 [ 707.624560][T24972] folio_alloc+0x1a/0x20 [ 707.628805][T24972] filemap_alloc_folio+0x53/0xf0 [ 707.633751][T24972] __filemap_get_folio+0x443/0x690 [ 707.638915][T24972] pagecache_get_page+0x26/0xe0 [ 707.643872][T24972] grab_cache_page_write_begin+0x3f/0x50 [ 707.649485][T24972] cont_write_begin+0x4ab/0x7b0 [ 707.654395][T24972] fat_write_begin+0x61/0xf0 [ 707.658988][T24972] ? fat_block_truncate_page+0x30/0x30 [ 707.664425][T24972] generic_perform_write+0x1c8/0x400 [ 707.669777][T24972] ? fat_write_begin+0xf0/0xf0 [ 707.674604][T24972] __generic_file_write_iter+0x195/0x2b0 [ 707.680251][T24972] ? generic_write_checks+0x250/0x290 [ 707.685645][T24972] generic_file_write_iter+0x75/0x130 [ 707.691115][T24972] do_iter_readv_writev+0x2de/0x380 [ 707.696310][T24972] do_iter_write+0x192/0x5c0 [ 707.700932][T24972] ? splice_from_pipe_next+0x34f/0x3b0 [ 707.706476][T24972] ? kmalloc_array+0x2d/0x40 [ 707.711088][T24972] vfs_iter_write+0x4c/0x70 [ 707.715627][T24972] iter_file_splice_write+0x43a/0x790 [ 707.721590][T24972] ? splice_from_pipe+0xd0/0xd0 [ 707.726436][T24972] direct_splice_actor+0x80/0xa0 [ 707.731443][T24972] splice_direct_to_actor+0x345/0x650 [ 707.736793][T24972] ? do_splice_direct+0x190/0x190 [ 707.741958][T24972] do_splice_direct+0x106/0x190 [ 707.746803][T24972] do_sendfile+0x675/0xc40 [ 707.751247][T24972] __x64_sys_sendfile64+0x102/0x140 [ 707.756516][T24972] do_syscall_64+0x44/0xd0 [ 707.760954][T24972] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 707.766844][T24972] RIP: 0033:0x7fe1cb921ae9 [ 707.771235][T24972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.790820][T24972] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 707.799234][T24972] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 707.807221][T24972] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 707.815193][T24972] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.823146][T24972] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 707.831101][T24972] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 707.839053][T24972] 11:03:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x1c243911) keyctl$chown(0x4, r5, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r5, 0xffffffffffffffff, r6) keyctl$get_security(0x11, r5, 0x0, 0x0) keyctl$search(0xa, r0, &(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, r5) keyctl$chown(0x4, r4, r2, 0x0) 11:03:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002d) 11:03:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b400) 11:03:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800011cb) 11:03:24 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001001) 11:03:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 39) 11:03:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = request_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='\x00', r0) r5 = request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000001c0)='keyring\x00', r4) r6 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$negate(0xd, r4, 0x8001, r5) keyctl$chown(0x4, r6, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) keyctl$chown(0x4, 0x0, r7, r3) 11:03:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002e) [ 708.003627][T24991] loop1: detected capacity change from 0 to 262160 [ 708.008448][T24996] loop0: detected capacity change from 0 to 262160 [ 708.010490][T24993] loop5: detected capacity change from 0 to 262160 [ 708.024114][T24998] loop3: detected capacity change from 0 to 262160 11:03:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r7}) recvmmsg(0xffffffffffffffff, &(0x7f0000008000)=[{{&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)=""/84, 0x54}, {&(0x7f0000000180)=""/103, 0x67}], 0x2, &(0x7f0000000240)=""/75, 0x4b}}, {{&(0x7f00000002c0)=@pppoe, 0x80, &(0x7f0000000580)=[{&(0x7f0000000380)}, {0x0}, {&(0x7f0000002200)=""/4096, 0x1000}, {&(0x7f0000000480)=""/223, 0xdf}], 0x4, &(0x7f00000005c0)=""/157, 0x9d}, 0x9ab}, {{&(0x7f0000000680)=@l2tp={0x2, 0x0, @empty}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000700)=""/156, 0x9c}, {&(0x7f00000007c0)=""/196, 0xc4}, {&(0x7f00000008c0)=""/33, 0x21}], 0x3, &(0x7f0000000940)}, 0xfff}, {{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000980)}, {&(0x7f00000009c0)=""/22, 0x16}, {&(0x7f0000000a00)=""/182, 0xb6}], 0x3, &(0x7f0000000b00)=""/201, 0xc9}, 0x80}, {{&(0x7f0000000c00)=@tipc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/7, 0x7}, {&(0x7f0000000cc0)=""/8, 0x8}, {&(0x7f0000000d00)=""/135, 0x87}], 0x3, &(0x7f0000000e00)=""/194, 0xc2}, 0xca3b}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000000f80)=""/196, 0xc4}], 0x2, &(0x7f00000010c0)=""/191, 0xbf}, 0x3}, {{0x0, 0x0, &(0x7f0000004500)=[{&(0x7f0000001200)=""/50, 0x32}, {&(0x7f0000001240)=""/129, 0x81}, {&(0x7f0000001300)=""/141, 0x8d}, {&(0x7f0000004200)=""/144, 0x90}, {&(0x7f00000042c0)=""/116, 0x74}, {&(0x7f0000004340)=""/132, 0x84}, {&(0x7f0000004400)=""/229, 0xe5}], 0x7, &(0x7f0000004580)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000005580)=""/4096, 0x1000}], 0x1, &(0x7f0000006580)=""/82, 0x52}, 0x5d}, {{&(0x7f0000006600)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006680)=""/81, 0x51}, {&(0x7f0000006700)=""/161, 0xa1}, {&(0x7f00000067c0)=""/73, 0x49}, {&(0x7f0000006840)=""/47, 0x2f}, {&(0x7f0000006880)=""/17, 0x11}, {&(0x7f00000068c0)=""/169, 0xa9}, {&(0x7f0000006980)=""/220, 0xdc}, {&(0x7f0000006a80)=""/162, 0xa2}], 0x8, &(0x7f0000006bc0)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000007bc0)=@x25, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007c40)=""/149, 0x95}, {&(0x7f0000007d00)=""/164, 0xa4}, {&(0x7f0000007dc0)=""/196, 0xc4}], 0x3, &(0x7f0000007f00)=""/253, 0xfd}}], 0xa, 0x40012040, &(0x7f0000008280)={0x77359400}) r9 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) write(r9, &(0x7f0000001400)="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", 0xe00) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xa, 0x6, 0x371d, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r10, &(0x7f0000000000), &(0x7f0000000100)=""/149}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r10, &(0x7f00000005c0), &(0x7f0000000080)=""/84}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000008780)={0xd, 0xe, &(0x7f0000000940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0xffffffff}, [@jmp={0x5, 0x1, 0x9, 0x3, 0xb, 0x2, 0x5bd54b7d69421a79}, @jmp={0x5, 0x0, 0xb, 0x1, 0x8, 0x0, 0x8}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @generic={0x3f, 0x2, 0x9, 0x8d}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @alu={0x7, 0x1, 0x7, 0x7, 0x1, 0x2, 0xffffffffffffffff}, @map={0x18, 0x3, 0x1, 0x0, r10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000380)='GPL\x00', 0x3, 0xb5, &(0x7f0000008400)=""/181, 0x41000, 0x12, '\x00', r8, 0x18, r9, 0x8, &(0x7f00000084c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000008500)={0xfffffffe, 0xb, 0x80000001, 0x8ee1}, 0x10}, 0x78) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x81}}, './file0\x00'}) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="d80200002d00100026bd7000fedbdf2500000000", @ANYRES32=r8, @ANYBLOB="1000090001000b000600030008000b0005000081b744d8f1a52e8a62b77fa54b0008000100627066009c020200050082757d3ac9849d7907", @ANYRES32=r11, @ANYBLOB="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"], 0x2d8}, 0x1, 0x0, 0x0, 0x40004}, 0x44) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, r4, r2, 0x0) [ 708.061558][T24998] FAULT_INJECTION: forcing a failure. [ 708.061558][T24998] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 708.074834][T24998] CPU: 1 PID: 24998 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 708.083629][T24998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.093760][T24998] Call Trace: [ 708.097041][T24998] [ 708.099973][T24998] dump_stack_lvl+0xd6/0x122 [ 708.104656][T24998] dump_stack+0x11/0x1b 11:03:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b500) [ 708.108900][T24998] should_fail+0x23c/0x250 [ 708.113307][T24998] __alloc_pages+0x102/0x330 [ 708.117900][T24998] alloc_pages+0x382/0x3d0 [ 708.122301][T24998] folio_alloc+0x1a/0x20 [ 708.126525][T24998] filemap_alloc_folio+0x53/0xf0 [ 708.131502][T24998] __filemap_get_folio+0x443/0x690 [ 708.136626][T24998] pagecache_get_page+0x26/0xe0 [ 708.141558][T24998] grab_cache_page_write_begin+0x3f/0x50 [ 708.147229][T24998] cont_write_begin+0x4ab/0x7b0 [ 708.152078][T24998] fat_write_begin+0x61/0xf0 [ 708.156655][T24998] ? fat_block_truncate_page+0x30/0x30 [ 708.162178][T24998] generic_perform_write+0x1c8/0x400 [ 708.167456][T24998] ? fat_write_begin+0xf0/0xf0 [ 708.172216][T24998] __generic_file_write_iter+0x195/0x2b0 [ 708.177867][T24998] ? generic_write_checks+0x250/0x290 [ 708.183231][T24998] generic_file_write_iter+0x75/0x130 [ 708.188642][T24998] do_iter_readv_writev+0x2de/0x380 [ 708.194005][T24998] do_iter_write+0x192/0x5c0 [ 708.198645][T24998] vfs_iter_write+0x4c/0x70 [ 708.203155][T24998] iter_file_splice_write+0x43a/0x790 [ 708.208703][T24998] ? splice_from_pipe+0xd0/0xd0 [ 708.213642][T24998] direct_splice_actor+0x80/0xa0 [ 708.218567][T24998] splice_direct_to_actor+0x345/0x650 [ 708.223927][T24998] ? do_splice_direct+0x190/0x190 [ 708.228958][T24998] do_splice_direct+0x106/0x190 [ 708.233802][T24998] do_sendfile+0x675/0xc40 [ 708.238205][T24998] __x64_sys_sendfile64+0x102/0x140 [ 708.243391][T24998] do_syscall_64+0x44/0xd0 [ 708.247793][T24998] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 708.253771][T24998] RIP: 0033:0x7fe1cb921ae9 [ 708.258171][T24998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 708.277834][T24998] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 708.286256][T24998] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 708.294241][T24998] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 708.302194][T24998] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 11:03:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001200) 11:03:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 40) [ 708.310160][T24998] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 708.318327][T24998] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 708.326310][T24998] [ 708.360827][T25012] loop1: detected capacity change from 0 to 262160 [ 708.369363][T25015] loop0: detected capacity change from 0 to 262160 [ 708.372656][T25016] loop5: detected capacity change from 0 to 262160 [ 708.386868][T25018] loop3: detected capacity change from 0 to 262160 [ 708.429584][T25018] FAULT_INJECTION: forcing a failure. [ 708.429584][T25018] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 708.442867][T25018] CPU: 0 PID: 25018 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 708.451631][T25018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.461784][T25018] Call Trace: [ 708.465172][T25018] [ 708.468215][T25018] dump_stack_lvl+0xd6/0x122 [ 708.472813][T25018] dump_stack+0x11/0x1b 11:03:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b600) 11:03:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002f) 11:03:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001300) [ 708.476978][T25018] should_fail+0x23c/0x250 [ 708.481398][T25018] __alloc_pages+0x102/0x330 [ 708.486074][T25018] alloc_pages+0x382/0x3d0 [ 708.490494][T25018] folio_alloc+0x1a/0x20 [ 708.494746][T25018] filemap_alloc_folio+0x53/0xf0 [ 708.499712][T25018] __filemap_get_folio+0x443/0x690 [ 708.504881][T25018] pagecache_get_page+0x26/0xe0 [ 708.509805][T25018] grab_cache_page_write_begin+0x3f/0x50 [ 708.515599][T25018] cont_write_begin+0x4ab/0x7b0 [ 708.520467][T25018] fat_write_begin+0x61/0xf0 [ 708.525170][T25018] ? fat_block_truncate_page+0x30/0x30 [ 708.530663][T25018] generic_perform_write+0x1c8/0x400 [ 708.535949][T25018] ? fat_write_begin+0xf0/0xf0 [ 708.540772][T25018] __generic_file_write_iter+0x195/0x2b0 [ 708.546430][T25018] ? generic_write_checks+0x250/0x290 [ 708.551830][T25018] generic_file_write_iter+0x75/0x130 [ 708.557226][T25018] do_iter_readv_writev+0x2de/0x380 [ 708.562426][T25018] do_iter_write+0x192/0x5c0 [ 708.566997][T25018] ? splice_from_pipe_next+0x34f/0x3b0 [ 708.572456][T25018] ? kmalloc_array+0x2d/0x40 [ 708.577166][T25018] vfs_iter_write+0x4c/0x70 [ 708.581659][T25018] iter_file_splice_write+0x43a/0x790 [ 708.587117][T25018] ? splice_from_pipe+0xd0/0xd0 [ 708.591991][T25018] direct_splice_actor+0x80/0xa0 [ 708.597064][T25018] splice_direct_to_actor+0x345/0x650 [ 708.602450][T25018] ? do_splice_direct+0x190/0x190 [ 708.607587][T25018] do_splice_direct+0x106/0x190 [ 708.612490][T25018] do_sendfile+0x675/0xc40 [ 708.616887][T25018] __x64_sys_sendfile64+0x102/0x140 [ 708.622082][T25018] do_syscall_64+0x44/0xd0 [ 708.626494][T25018] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 708.632369][T25018] RIP: 0033:0x7fe1cb921ae9 [ 708.636777][T25018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 708.656558][T25018] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 708.664951][T25018] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 708.672920][T25018] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 11:03:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 41) [ 708.680884][T25018] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 708.688834][T25018] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 708.696920][T25018] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 708.704903][T25018] [ 708.751638][T25026] loop0: detected capacity change from 0 to 262160 [ 708.757587][T25028] loop5: detected capacity change from 0 to 262160 [ 708.759536][T25025] loop1: detected capacity change from 0 to 262160 [ 708.784396][T25030] loop3: detected capacity change from 0 to 262160 [ 708.808730][T25030] FAULT_INJECTION: forcing a failure. [ 708.808730][T25030] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 708.821991][T25030] CPU: 1 PID: 25030 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 708.830915][T25030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.841025][T25030] Call Trace: [ 708.844476][T25030] [ 708.847404][T25030] dump_stack_lvl+0xd6/0x122 [ 708.852026][T25030] dump_stack+0x11/0x1b [ 708.856238][T25030] should_fail+0x23c/0x250 [ 708.860634][T25030] __alloc_pages+0x102/0x330 [ 708.865218][T25030] alloc_pages+0x382/0x3d0 [ 708.869627][T25030] folio_alloc+0x1a/0x20 [ 708.873850][T25030] filemap_alloc_folio+0x53/0xf0 [ 708.878850][T25030] __filemap_get_folio+0x443/0x690 [ 708.883960][T25030] pagecache_get_page+0x26/0xe0 [ 708.888917][T25030] grab_cache_page_write_begin+0x3f/0x50 [ 708.894566][T25030] cont_write_begin+0x4ab/0x7b0 [ 708.899414][T25030] fat_write_begin+0x61/0xf0 [ 708.904039][T25030] ? fat_block_truncate_page+0x30/0x30 [ 708.909642][T25030] generic_perform_write+0x1c8/0x400 [ 708.914919][T25030] ? fat_write_begin+0xf0/0xf0 [ 708.919762][T25030] __generic_file_write_iter+0x195/0x2b0 [ 708.925396][T25030] ? generic_write_checks+0x250/0x290 [ 708.927399][ T24] audit: type=1326 audit(1638788605.729:1071641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25006 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 708.930766][T25030] generic_file_write_iter+0x75/0x130 [ 708.930795][T25030] do_iter_readv_writev+0x2de/0x380 [ 708.965566][T25030] do_iter_write+0x192/0x5c0 [ 708.970203][T25030] ? splice_from_pipe_next+0x34f/0x3b0 [ 708.975657][T25030] ? kmalloc_array+0x2d/0x40 [ 708.980305][T25030] vfs_iter_write+0x4c/0x70 [ 708.984816][T25030] iter_file_splice_write+0x43a/0x790 [ 708.990200][T25030] ? splice_from_pipe+0xd0/0xd0 [ 708.995191][T25030] direct_splice_actor+0x80/0xa0 [ 709.000181][T25030] splice_direct_to_actor+0x345/0x650 [ 709.005585][T25030] ? do_splice_direct+0x190/0x190 [ 709.010600][T25030] do_splice_direct+0x106/0x190 [ 709.015440][T25030] do_sendfile+0x675/0xc40 [ 709.019855][T25030] __x64_sys_sendfile64+0x102/0x140 [ 709.025037][T25030] do_syscall_64+0x44/0xd0 [ 709.029446][T25030] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 709.035540][T25030] RIP: 0033:0x7fe1cb921ae9 [ 709.039947][T25030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 709.059549][T25030] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 709.067946][T25030] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 709.075905][T25030] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 709.083875][T25030] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 709.091829][T25030] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 709.099866][T25030] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 709.107833][T25030] [ 709.117474][ T24] audit: type=1326 audit(1638788605.769:1071642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25006 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:25 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001300) 11:03:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001400) 11:03:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b700) 11:03:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000030) [ 709.141902][ T24] audit: type=1326 audit(1638788605.769:1071643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25006 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 709.166353][ T24] audit: type=1326 audit(1638788605.769:1071644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25006 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 709.190629][ T24] audit: type=1326 audit(1638788605.769:1071645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25006 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 709.215050][ T24] audit: type=1326 audit(1638788605.769:1071646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25006 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 709.219641][T25040] loop0: detected capacity change from 0 to 262160 11:03:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 42) 11:03:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b800) [ 709.239327][ T24] audit: type=1326 audit(1638788605.769:1071647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25006 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 709.239392][ T24] audit: type=1326 audit(1638788605.769:1071648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25006 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000040)={0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x1c243911) keyctl$chown(0x4, r5, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r5, 0xffffffffffffffff, r6) keyctl$get_security(0x11, r5, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r5) 11:03:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r7, 0x1c243911) keyctl$chown(0x4, r7, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r7, 0xffffffffffffffff, r8) keyctl$get_security(0x11, r7, 0x0, 0x0) keyctl$setperm(0x5, r7, 0x8100000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r9}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) r11 = syz_open_procfs(r10, &(0x7f0000000080)='mounts\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r11, 0x40182103, &(0x7f00000000c0)={0x0, 0x1, r5, 0x1ff}) 11:03:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001500) [ 709.309865][T25045] loop5: detected capacity change from 0 to 262160 [ 709.318788][T25046] loop1: detected capacity change from 0 to 262160 [ 709.341051][T25052] loop3: detected capacity change from 0 to 262160 [ 709.349825][T25054] loop0: detected capacity change from 0 to 262160 11:03:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b900) 11:03:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000031) [ 709.390841][T25052] FAULT_INJECTION: forcing a failure. [ 709.390841][T25052] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 709.404271][T25052] CPU: 1 PID: 25052 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 709.413043][T25052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.423213][T25052] Call Trace: [ 709.426513][T25052] [ 709.429614][T25052] dump_stack_lvl+0xd6/0x122 [ 709.434279][T25052] dump_stack+0x11/0x1b [ 709.438438][T25052] should_fail+0x23c/0x250 [ 709.442842][T25052] __alloc_pages+0x102/0x330 [ 709.447420][T25052] alloc_pages+0x382/0x3d0 [ 709.451840][T25052] folio_alloc+0x1a/0x20 [ 709.456061][T25052] filemap_alloc_folio+0x53/0xf0 [ 709.460987][T25052] __filemap_get_folio+0x443/0x690 [ 709.466102][T25052] pagecache_get_page+0x26/0xe0 [ 709.470937][T25052] grab_cache_page_write_begin+0x3f/0x50 [ 709.476553][T25052] cont_write_begin+0x4ab/0x7b0 [ 709.481425][T25052] fat_write_begin+0x61/0xf0 [ 709.486016][T25052] ? fat_block_truncate_page+0x30/0x30 [ 709.491466][T25052] generic_perform_write+0x1c8/0x400 [ 709.496742][T25052] ? fat_write_begin+0xf0/0xf0 [ 709.501494][T25052] __generic_file_write_iter+0x195/0x2b0 [ 709.507152][T25052] ? generic_write_checks+0x250/0x290 [ 709.512524][T25052] generic_file_write_iter+0x75/0x130 [ 709.517929][T25052] do_iter_readv_writev+0x2de/0x380 [ 709.523108][T25052] do_iter_write+0x192/0x5c0 [ 709.527727][T25052] ? splice_from_pipe_next+0x34f/0x3b0 [ 709.533344][T25052] ? kmalloc_array+0x2d/0x40 [ 709.537961][T25052] vfs_iter_write+0x4c/0x70 [ 709.542551][T25052] iter_file_splice_write+0x43a/0x790 [ 709.548063][T25052] ? splice_from_pipe+0xd0/0xd0 [ 709.552908][T25052] direct_splice_actor+0x80/0xa0 [ 709.557825][T25052] splice_direct_to_actor+0x345/0x650 [ 709.563174][T25052] ? do_splice_direct+0x190/0x190 [ 709.568247][T25052] do_splice_direct+0x106/0x190 [ 709.573084][T25052] do_sendfile+0x675/0xc40 [ 709.577540][T25052] __x64_sys_sendfile64+0x102/0x140 [ 709.582824][T25052] do_syscall_64+0x44/0xd0 [ 709.587275][T25052] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 709.593153][T25052] RIP: 0033:0x7fe1cb921ae9 [ 709.597629][T25052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 709.617295][T25052] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 709.625701][T25052] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 709.633666][T25052] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 11:03:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 43) [ 709.641681][T25052] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 709.649773][T25052] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 709.657814][T25052] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 709.665907][T25052] [ 709.686688][T25062] loop5: detected capacity change from 0 to 262160 [ 709.724303][T25067] loop0: detected capacity change from 0 to 262160 [ 709.724547][T25066] loop1: detected capacity change from 0 to 262160 [ 709.744021][T25069] loop3: detected capacity change from 0 to 262160 [ 709.771695][T25069] FAULT_INJECTION: forcing a failure. [ 709.771695][T25069] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 709.785009][T25069] CPU: 1 PID: 25069 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 709.793771][T25069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.803904][T25069] Call Trace: [ 709.807183][T25069] [ 709.810107][T25069] dump_stack_lvl+0xd6/0x122 [ 709.814714][T25069] dump_stack+0x11/0x1b [ 709.818926][T25069] should_fail+0x23c/0x250 [ 709.823434][T25069] __alloc_pages+0x102/0x330 [ 709.828074][T25069] alloc_pages+0x382/0x3d0 [ 709.832495][T25069] folio_alloc+0x1a/0x20 [ 709.836739][T25069] filemap_alloc_folio+0x53/0xf0 [ 709.841759][T25069] __filemap_get_folio+0x443/0x690 [ 709.846883][T25069] pagecache_get_page+0x26/0xe0 [ 709.851779][T25069] grab_cache_page_write_begin+0x3f/0x50 [ 709.857419][T25069] cont_write_begin+0x4ab/0x7b0 [ 709.862323][T25069] fat_write_begin+0x61/0xf0 [ 709.866911][T25069] ? fat_block_truncate_page+0x30/0x30 [ 709.872443][T25069] generic_perform_write+0x1c8/0x400 [ 709.877760][T25069] ? fat_write_begin+0xf0/0xf0 [ 709.882538][T25069] __generic_file_write_iter+0x195/0x2b0 [ 709.888322][T25069] ? generic_write_checks+0x250/0x290 [ 709.893721][T25069] generic_file_write_iter+0x75/0x130 [ 709.899172][T25069] do_iter_readv_writev+0x2de/0x380 [ 709.904451][T25069] do_iter_write+0x192/0x5c0 [ 709.909042][T25069] ? splice_from_pipe_next+0x34f/0x3b0 [ 709.914592][T25069] ? kmalloc_array+0x2d/0x40 [ 709.919183][T25069] vfs_iter_write+0x4c/0x70 [ 709.923781][T25069] iter_file_splice_write+0x43a/0x790 [ 709.929181][T25069] ? splice_from_pipe+0xd0/0xd0 [ 709.934089][T25069] direct_splice_actor+0x80/0xa0 [ 709.939036][T25069] splice_direct_to_actor+0x345/0x650 [ 709.944421][T25069] ? do_splice_direct+0x190/0x190 [ 709.949449][T25069] do_splice_direct+0x106/0x190 [ 709.954302][T25069] do_sendfile+0x675/0xc40 [ 709.958790][T25069] __x64_sys_sendfile64+0x102/0x140 [ 709.964001][T25069] do_syscall_64+0x44/0xd0 [ 709.968422][T25069] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 709.974381][T25069] RIP: 0033:0x7fe1cb921ae9 [ 709.978821][T25069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 709.998875][T25069] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 710.007358][T25069] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 710.015414][T25069] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 710.023368][T25069] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 710.031369][T25069] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 710.039385][T25069] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 710.047429][T25069] 11:03:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001600) 11:03:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001600) 11:03:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffffffffffffffff) 11:03:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000032) 11:03:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 44) [ 710.193918][T25077] loop0: detected capacity change from 0 to 262160 [ 710.198065][T25080] loop5: detected capacity change from 0 to 262160 [ 710.200926][T25079] loop3: detected capacity change from 0 to 262160 [ 710.209370][T25081] loop1: detected capacity change from 0 to 262160 11:03:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001700) 11:03:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000033) [ 710.296850][T25079] FAULT_INJECTION: forcing a failure. [ 710.296850][T25079] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 710.310199][T25079] CPU: 1 PID: 25079 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 710.318993][T25079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.329052][T25079] Call Trace: [ 710.332332][T25079] [ 710.335267][T25079] dump_stack_lvl+0xd6/0x122 [ 710.339870][T25079] dump_stack+0x11/0x1b [ 710.344042][T25079] should_fail+0x23c/0x250 [ 710.348466][T25079] __alloc_pages+0x102/0x330 [ 710.353093][T25079] alloc_pages+0x382/0x3d0 [ 710.357510][T25079] folio_alloc+0x1a/0x20 [ 710.361763][T25079] filemap_alloc_folio+0x53/0xf0 [ 710.366726][T25079] __filemap_get_folio+0x443/0x690 [ 710.371850][T25079] pagecache_get_page+0x26/0xe0 [ 710.376731][T25079] grab_cache_page_write_begin+0x3f/0x50 [ 710.382408][T25079] cont_write_begin+0x4ab/0x7b0 [ 710.387268][T25079] fat_write_begin+0x61/0xf0 [ 710.391901][T25079] ? fat_block_truncate_page+0x30/0x30 [ 710.397438][T25079] generic_perform_write+0x1c8/0x400 [ 710.402737][T25079] ? fat_write_begin+0xf0/0xf0 [ 710.407514][T25079] __generic_file_write_iter+0x195/0x2b0 [ 710.413177][T25079] ? generic_write_checks+0x250/0x290 [ 710.418638][T25079] generic_file_write_iter+0x75/0x130 [ 710.424079][T25079] do_iter_readv_writev+0x2de/0x380 [ 710.429353][T25079] do_iter_write+0x192/0x5c0 [ 710.434003][T25079] ? splice_from_pipe_next+0x34f/0x3b0 [ 710.439473][T25079] ? kmalloc_array+0x2d/0x40 [ 710.444082][T25079] vfs_iter_write+0x4c/0x70 [ 710.448671][T25079] iter_file_splice_write+0x43a/0x790 [ 710.454071][T25079] ? splice_from_pipe+0xd0/0xd0 [ 710.458972][T25079] direct_splice_actor+0x80/0xa0 [ 710.463904][T25079] splice_direct_to_actor+0x345/0x650 [ 710.469267][T25079] ? do_splice_direct+0x190/0x190 [ 710.474298][T25079] do_splice_direct+0x106/0x190 [ 710.479193][T25079] do_sendfile+0x675/0xc40 [ 710.483601][T25079] __x64_sys_sendfile64+0x102/0x140 [ 710.488788][T25079] do_syscall_64+0x44/0xd0 [ 710.493207][T25079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 710.499157][T25079] RIP: 0033:0x7fe1cb921ae9 [ 710.503689][T25079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 710.523281][T25079] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 710.531852][T25079] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 710.539821][T25079] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 710.547881][T25079] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 710.555837][T25079] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 710.563830][T25079] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 710.571904][T25079] [ 710.578834][T25093] loop5: detected capacity change from 0 to 262160 [ 710.581599][T25094] loop1: detected capacity change from 0 to 262160 11:03:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x8000, @media='eth\x00'}}}, ["", ""]}, 0x68}}, 0x48000) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), r1) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r5, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x200}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}]}]}, 0x7c}}, 0x40000) keyctl$chown(0x4, r4, r2, 0x0) 11:03:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 45) 11:03:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001800) 11:03:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000034) [ 710.672821][T25098] selinux_netlink_send: 215 callbacks suppressed [ 710.672836][T25098] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25098 comm=syz-executor.2 11:03:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x1c243911) keyctl$chown(0x4, r5, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r5, 0xffffffffffffffff, r6) keyctl$get_security(0x11, r5, 0x0, 0x0) r7 = syz_io_uring_complete(0x0) ioctl$sock_qrtr_SIOCGIFADDR(r7, 0x8915, &(0x7f0000000080)={'tunl0\x00'}) keyctl$KEYCTL_MOVE(0x1e, r5, r0, r0, 0x0) keyctl$chown(0x4, r4, r2, 0x0) [ 710.714642][T25100] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25100 comm=syz-executor.2 11:03:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001a00) 11:03:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100), &(0x7f00000001c0)={'U+', 0x1}, 0x16, 0x0) connect$inet(r2, &(0x7f0000000000)={0x3, 0x0, @dev}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r4) r5 = add_key$user(&(0x7f0000000040), &(0x7f0000001400)={'syz', 0x0}, &(0x7f0000000300)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4c693bc7456b14e2096f29e9cb45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c54184364a4b3ca6e157aefd6cec8345d33453fd773fcc52753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3ef593196dc18592f1aa91180f89bf0c615ee4210b0e533884fd3ab191b39aaabe0640c7d83c1f8d13da9c1e8d2aeed0f85c536197abc22d88a1489798fb968961ce0e8253857b2cd8d336d9dee310cffdcf590", 0x19c, r0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$chown(0x4, r5, r3, 0x0) 11:03:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x15, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) [ 710.825095][T25107] loop5: detected capacity change from 0 to 262160 [ 710.836889][T25109] loop1: detected capacity change from 0 to 262160 11:03:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) 11:03:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001900) [ 710.955734][T25123] FAULT_INJECTION: forcing a failure. [ 710.955734][T25123] name failslab, interval 1, probability 0, space 0, times 0 [ 710.968473][T25123] CPU: 0 PID: 25123 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 710.977821][T25123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.988050][T25123] Call Trace: [ 710.991335][T25123] [ 710.994273][T25123] dump_stack_lvl+0xd6/0x122 [ 710.998880][T25123] dump_stack+0x11/0x1b [ 711.003037][T25123] should_fail+0x23c/0x250 [ 711.007468][T25123] ? ext4_mb_new_blocks+0x328/0x1ee0 [ 711.012849][T25123] __should_failslab+0x81/0x90 [ 711.017644][T25123] should_failslab+0x5/0x20 [ 711.022219][T25123] kmem_cache_alloc+0x4f/0x320 [ 711.027090][T25123] ext4_mb_new_blocks+0x328/0x1ee0 [ 711.032217][T25123] ? ext4_find_extent+0x7b2/0x7e0 [ 711.037380][T25123] ? ext4_ext_search_right+0x246/0x4f0 [ 711.042890][T25123] ext4_ext_map_blocks+0x1658/0x2120 [ 711.048188][T25123] ? ext4_es_lookup_extent+0x221/0x500 [ 711.053673][T25123] ext4_map_blocks+0x71e/0xf00 [ 711.058444][T25123] ext4_iomap_begin+0x4b0/0x630 [ 711.063413][T25123] ? ext4_alloc_da_blocks+0x100/0x100 [ 711.068795][T25123] iomap_iter+0x395/0x4a0 [ 711.073136][T25123] __iomap_dio_rw+0x695/0x1070 [ 711.077915][T25123] iomap_dio_rw+0x38/0x80 [ 711.082257][T25123] ? ext4_file_write_iter+0x461/0x1200 [ 711.087777][T25123] ext4_file_write_iter+0xac3/0x1200 [ 711.093150][T25123] ? ext4_file_write_iter+0x461/0x1200 [ 711.098629][T25123] do_iter_readv_writev+0x2de/0x380 [ 711.103868][T25123] do_iter_write+0x192/0x5c0 [ 711.108787][T25123] ? splice_from_pipe_next+0x34f/0x3b0 [ 711.114259][T25123] ? kmalloc_array+0x2d/0x40 [ 711.118855][T25123] vfs_iter_write+0x4c/0x70 [ 711.123364][T25123] iter_file_splice_write+0x43a/0x790 [ 711.128750][T25123] ? splice_from_pipe+0xd0/0xd0 [ 711.133682][T25123] direct_splice_actor+0x80/0xa0 [ 711.138703][T25123] splice_direct_to_actor+0x345/0x650 [ 711.144083][T25123] ? do_splice_direct+0x190/0x190 [ 711.149143][T25123] do_splice_direct+0x106/0x190 [ 711.154142][T25123] do_sendfile+0x675/0xc40 [ 711.158565][T25123] __x64_sys_sendfile64+0x102/0x140 [ 711.163863][T25123] do_syscall_64+0x44/0xd0 [ 711.168398][T25123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 711.174437][T25123] RIP: 0033:0x7fe1cb921ae9 [ 711.178964][T25123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 711.198586][T25123] RSP: 002b:00007fe1cb077188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 11:03:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000035) [ 711.207129][T25123] RAX: ffffffffffffffda RBX: 00007fe1cba35028 RCX: 00007fe1cb921ae9 [ 711.215308][T25123] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 711.223348][T25123] RBP: 00007fe1cb0771d0 R08: 0000000000000000 R09: 0000000000000000 [ 711.231344][T25123] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 711.239315][T25123] R13: 00007ffdf469e34f R14: 00007fe1cb077300 R15: 0000000000022000 [ 711.247316][T25123] [ 711.260157][T25110] loop3: detected capacity change from 0 to 262160 [ 711.278803][T25129] loop5: detected capacity change from 0 to 262160 [ 711.290718][T25130] loop1: detected capacity change from 0 to 262160 11:03:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001a00) 11:03:28 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) 11:03:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 46) 11:03:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000036) 11:03:28 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x80) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) [ 711.362813][T25133] loop5: detected capacity change from 0 to 262160 11:03:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001b00) [ 711.415520][T25141] loop1: detected capacity change from 0 to 262160 [ 711.459013][T25145] loop3: detected capacity change from 0 to 262160 [ 711.497782][T25149] loop5: detected capacity change from 0 to 262160 [ 711.498628][T25145] FAULT_INJECTION: forcing a failure. [ 711.498628][T25145] name failslab, interval 1, probability 0, space 0, times 0 [ 711.516919][T25145] CPU: 1 PID: 25145 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 711.525723][T25145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.535808][T25145] Call Trace: [ 711.539125][T25145] [ 711.542052][T25145] dump_stack_lvl+0xd6/0x122 [ 711.546686][T25145] dump_stack+0x11/0x1b [ 711.550877][T25145] should_fail+0x23c/0x250 [ 711.555298][T25145] ? fat_cache_add+0x1f7/0x4f0 [ 711.560149][T25145] __should_failslab+0x81/0x90 [ 711.564967][T25145] should_failslab+0x5/0x20 [ 711.569520][T25145] kmem_cache_alloc+0x4f/0x320 [ 711.574464][T25145] fat_cache_add+0x1f7/0x4f0 [ 711.579068][T25145] fat_get_cluster+0x5ca/0x890 [ 711.583912][T25145] fat_get_mapped_cluster+0xe0/0x260 [ 711.589196][T25145] fat_bmap+0x258/0x290 [ 711.593354][T25145] fat_get_block+0x3cb/0x610 [ 711.597949][T25145] __block_write_begin_int+0x4c5/0x1010 [ 711.603504][T25145] ? fat_block_truncate_page+0x30/0x30 [ 711.608992][T25145] cont_write_begin+0x4cf/0x7b0 [ 711.613863][T25145] fat_write_begin+0x61/0xf0 [ 711.618525][T25145] ? fat_block_truncate_page+0x30/0x30 [ 711.623985][T25145] generic_perform_write+0x1c8/0x400 [ 711.629277][T25145] ? fat_write_begin+0xf0/0xf0 [ 711.634095][T25145] __generic_file_write_iter+0x195/0x2b0 [ 711.639763][T25145] ? generic_write_checks+0x250/0x290 [ 711.645315][T25145] generic_file_write_iter+0x75/0x130 [ 711.650692][T25145] do_iter_readv_writev+0x2de/0x380 [ 711.656001][T25145] do_iter_write+0x192/0x5c0 [ 711.660651][T25145] ? splice_from_pipe_next+0x34f/0x3b0 [ 711.666236][T25145] ? kmalloc_array+0x2d/0x40 [ 711.670825][T25145] vfs_iter_write+0x4c/0x70 [ 711.675411][T25145] iter_file_splice_write+0x43a/0x790 [ 711.680805][T25145] ? splice_from_pipe+0xd0/0xd0 [ 711.685715][T25145] direct_splice_actor+0x80/0xa0 [ 711.690670][T25145] splice_direct_to_actor+0x345/0x650 [ 711.696105][T25145] ? do_splice_direct+0x190/0x190 [ 711.701137][T25145] do_splice_direct+0x106/0x190 [ 711.706004][T25145] do_sendfile+0x675/0xc40 [ 711.710456][T25145] __x64_sys_sendfile64+0x102/0x140 [ 711.715657][T25145] do_syscall_64+0x44/0xd0 [ 711.720092][T25145] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 711.726062][T25145] RIP: 0033:0x7fe1cb921ae9 [ 711.730479][T25145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 711.750089][T25145] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 711.758514][T25145] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 711.766495][T25145] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 711.774566][T25145] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 711.782610][T25145] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 711.790752][T25145] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 711.799196][T25145] 11:03:28 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001d00) 11:03:28 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r1 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r2 = request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='\'\x00', r0) r3 = add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="1b", 0x1, r0) keyctl$dh_compute(0x17, &(0x7f0000000200)={r2, r1, r3}, &(0x7f0000000240)=""/226, 0xe2, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) 11:03:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000037) 11:03:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001c00) 11:03:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 47) 11:03:28 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x1d, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000240)="d289c8dc5258e6992df0bf7a522b3add88302fab8e2d140e6f6609da516727e987f5e324cf6417e89ad05d31ebb028a24636bb368981aa8831f05417a417825b9da8db870e641435d7963ec32a21a0e35192af259430dec5b036a6e8d3c17f3b9e268300606e0557c0c8f35841b9db258b3150e4c20fb60d", 0x78, r0) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) getgroups(0xa, &(0x7f0000000200)=[r3, r3, 0xffffffffffffffff, r3, 0xee00, r3, r3, r3, r3, r3]) keyctl$chown(0x4, r5, r2, r6) [ 711.864505][T25155] loop1: detected capacity change from 0 to 262160 [ 711.874137][T25157] loop5: detected capacity change from 0 to 262160 [ 711.893432][T25162] loop3: detected capacity change from 0 to 262160 [ 711.968056][T25164] can: request_module (can-proto-0) failed. [ 711.978964][T25164] can: request_module (can-proto-0) failed. [ 711.987146][T25162] FAULT_INJECTION: forcing a failure. [ 711.987146][T25162] name failslab, interval 1, probability 0, space 0, times 0 [ 711.999837][T25162] CPU: 0 PID: 25162 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 712.008666][T25162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.018898][T25162] Call Trace: [ 712.022174][T25162] [ 712.025296][T25162] dump_stack_lvl+0xd6/0x122 [ 712.029921][T25162] dump_stack+0x11/0x1b [ 712.034081][T25162] should_fail+0x23c/0x250 [ 712.038493][T25162] ? fat_cache_add+0x1f7/0x4f0 [ 712.043327][T25162] __should_failslab+0x81/0x90 [ 712.048102][T25162] should_failslab+0x5/0x20 [ 712.052618][T25162] kmem_cache_alloc+0x4f/0x320 [ 712.057451][T25162] fat_cache_add+0x1f7/0x4f0 [ 712.062042][T25162] fat_get_cluster+0x5ca/0x890 [ 712.066876][T25162] fat_truncate_blocks+0x29a/0x580 [ 712.072004][T25162] fat_write_begin+0xd0/0xf0 [ 712.076641][T25162] generic_perform_write+0x1c8/0x400 [ 712.081934][T25162] ? fat_write_begin+0xf0/0xf0 [ 712.086711][T25162] __generic_file_write_iter+0x195/0x2b0 [ 712.092401][T25162] ? generic_write_checks+0x250/0x290 [ 712.097775][T25162] generic_file_write_iter+0x75/0x130 [ 712.103214][T25162] do_iter_readv_writev+0x2de/0x380 [ 712.108404][T25162] do_iter_write+0x192/0x5c0 [ 712.113001][T25162] ? splice_from_pipe_next+0x34f/0x3b0 [ 712.118560][T25162] ? kmalloc_array+0x2d/0x40 [ 712.123147][T25162] vfs_iter_write+0x4c/0x70 [ 712.127698][T25162] iter_file_splice_write+0x43a/0x790 [ 712.133070][T25162] ? splice_from_pipe+0xd0/0xd0 [ 712.137986][T25162] direct_splice_actor+0x80/0xa0 [ 712.142926][T25162] splice_direct_to_actor+0x345/0x650 [ 712.148371][T25162] ? do_splice_direct+0x190/0x190 [ 712.153424][T25162] do_splice_direct+0x106/0x190 [ 712.158325][T25162] do_sendfile+0x675/0xc40 [ 712.162747][T25162] __x64_sys_sendfile64+0x102/0x140 [ 712.167943][T25162] do_syscall_64+0x44/0xd0 [ 712.172420][T25162] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 712.178455][T25162] RIP: 0033:0x7fe1cb921ae9 [ 712.182870][T25162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 712.202527][T25162] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 712.211047][T25162] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 11:03:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000038) 11:03:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001d00) 11:03:29 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$instantiate_iov(0x14, r4, &(0x7f00000000c0), 0x0, r0) r5 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r5, r2, 0x0) 11:03:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 48) 11:03:29 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) [ 712.219206][T25162] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 712.227186][T25162] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 712.235390][T25162] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 712.243386][T25162] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 712.251355][T25162] 11:03:29 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x1c243911) keyctl$chown(0x4, r3, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r3, 0xffffffffffffffff, r4) keyctl$get_security(0x11, r3, 0x0, 0x0) keyctl$revoke(0x3, r3) keyctl$chown(0x4, 0x0, 0xee00, r2) keyctl$chown(0x4, 0x0, r1, 0x0) [ 712.320875][T25179] loop1: detected capacity change from 0 to 262160 [ 712.327745][T25183] loop3: detected capacity change from 0 to 262160 [ 712.335898][T25181] loop5: detected capacity change from 0 to 262160 11:03:29 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002000) 11:03:29 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r7}) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000040)) [ 712.403277][T25183] FAULT_INJECTION: forcing a failure. [ 712.403277][T25183] name failslab, interval 1, probability 0, space 0, times 0 [ 712.415920][T25183] CPU: 0 PID: 25183 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 712.424718][T25183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.434769][T25183] Call Trace: [ 712.438055][T25183] [ 712.440982][T25183] dump_stack_lvl+0xd6/0x122 [ 712.445577][T25183] dump_stack+0x11/0x1b [ 712.449815][T25183] should_fail+0x23c/0x250 [ 712.454233][T25183] ? mempool_alloc_slab+0x16/0x20 [ 712.459289][T25183] __should_failslab+0x81/0x90 [ 712.464061][T25183] should_failslab+0x5/0x20 [ 712.468573][T25183] kmem_cache_alloc+0x4f/0x320 [ 712.473431][T25183] ? __rcu_read_unlock+0x5c/0x290 [ 712.478467][T25183] mempool_alloc_slab+0x16/0x20 [ 712.483383][T25183] ? mempool_free+0x130/0x130 [ 712.488068][T25183] mempool_alloc+0x9d/0x310 [ 712.492611][T25183] ? folio_mark_accessed+0x12f/0x380 [ 712.497932][T25183] bio_alloc_bioset+0xcc/0x560 11:03:29 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x8, 0x6, 0x80, 0x8, 0x0, 0x9, 0x11000, 0xd073a2bf81cfe012, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81, 0x2, @perf_bp={&(0x7f0000000300)}, 0x0, 0x8, 0x7a, 0x3, 0x5485e52a, 0x0, 0x401, 0x0, 0x6, 0x0, 0x7ff}, 0x0, 0xe, r0, 0xb) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r4 = dup2(r3, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0xc0182101, &(0x7f00000001c0)={r5}) ftruncate(r4, 0x9b6e) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x1f, 0x1f, 0x1b, 0xf7, 0x0, 0x4, 0x21, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_config_ext={0x0, 0x8}, 0x8, 0x2cb, 0x9, 0x5, 0x2979, 0x1, 0x8, 0x0, 0x100, 0x0, 0x77ed}, r2, 0x8, r0, 0xa) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x40) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005f740)={0x5847, [], 0x19, "9a71c44e88b407"}) sendfile(r1, r6, 0x0, 0x80000001) creat(&(0x7f0000000280)='./bus\x00', 0x80) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0xee00) 11:03:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001e00) 11:03:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000039) [ 712.502701][T25183] ? bdev_write_page+0x83/0x110 [ 712.507556][T25183] __mpage_writepage+0x9eb/0x1060 [ 712.512608][T25183] write_cache_pages+0x454/0x7f0 [ 712.517625][T25183] ? mpage_writepages+0x130/0x130 [ 712.522692][T25183] ? fat_block_truncate_page+0x30/0x30 [ 712.528220][T25183] mpage_writepages+0x7f/0x130 [ 712.532993][T25183] ? fat_block_truncate_page+0x30/0x30 [ 712.538516][T25183] ? fat_readpage+0x20/0x20 [ 712.543029][T25183] fat_writepages+0x20/0x30 [ 712.547611][T25183] do_writepages+0x1cb/0x330 [ 712.552223][T25193] loop0: detected capacity change from 0 to 262160 [ 712.552228][T25183] ? generic_perform_write+0x1c8/0x400 [ 712.564157][T25183] ? generic_perform_write+0x397/0x400 [ 712.569616][T25183] filemap_write_and_wait_range+0x1b2/0x340 [ 712.575605][T25183] __generic_file_write_iter+0x1c5/0x2b0 [ 712.581227][T25183] generic_file_write_iter+0x75/0x130 [ 712.586585][T25183] do_iter_readv_writev+0x2de/0x380 [ 712.591877][T25183] do_iter_write+0x192/0x5c0 [ 712.596891][T25183] ? splice_from_pipe_next+0x34f/0x3b0 [ 712.602451][T25183] ? kmalloc_array+0x2d/0x40 [ 712.607035][T25183] vfs_iter_write+0x4c/0x70 [ 712.611637][T25183] iter_file_splice_write+0x43a/0x790 [ 712.617074][T25183] ? splice_from_pipe+0xd0/0xd0 [ 712.621956][T25183] direct_splice_actor+0x80/0xa0 [ 712.626892][T25183] splice_direct_to_actor+0x345/0x650 [ 712.632254][T25183] ? do_splice_direct+0x190/0x190 [ 712.637269][T25183] do_splice_direct+0x106/0x190 [ 712.642168][T25183] do_sendfile+0x675/0xc40 [ 712.646603][T25183] __x64_sys_sendfile64+0x102/0x140 [ 712.651788][T25183] do_syscall_64+0x44/0xd0 [ 712.656191][T25183] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 712.662070][T25183] RIP: 0033:0x7fe1cb921ae9 [ 712.666480][T25183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 712.686156][T25183] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 712.694611][T25183] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 11:03:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 49) [ 712.702567][T25183] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 712.710580][T25183] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 712.718596][T25183] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 712.726597][T25183] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 712.734692][T25183] 11:03:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001f00) 11:03:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003a) [ 712.772061][T25197] loop5: detected capacity change from 0 to 262160 [ 712.773539][T25198] loop1: detected capacity change from 0 to 262160 [ 712.795829][T25200] loop3: detected capacity change from 0 to 262160 [ 712.837713][T25200] FAULT_INJECTION: forcing a failure. [ 712.837713][T25200] name failslab, interval 1, probability 0, space 0, times 0 [ 712.850340][T25200] CPU: 0 PID: 25200 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 712.859192][T25200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.869232][T25200] Call Trace: [ 712.872507][T25200] [ 712.875429][T25200] dump_stack_lvl+0xd6/0x122 [ 712.880057][T25200] dump_stack+0x11/0x1b [ 712.884236][T25200] should_fail+0x23c/0x250 [ 712.888635][T25200] ? mempool_alloc_slab+0x16/0x20 [ 712.893793][T25200] __should_failslab+0x81/0x90 [ 712.898639][T25200] should_failslab+0x5/0x20 [ 712.903249][T25200] kmem_cache_alloc+0x4f/0x320 [ 712.908002][T25200] ? mempool_alloc_slab+0x16/0x20 [ 712.913083][T25200] mempool_alloc_slab+0x16/0x20 [ 712.918002][T25200] ? mempool_free+0x130/0x130 [ 712.922787][T25200] mempool_alloc+0x9d/0x310 [ 712.927298][T25200] ? fat_alloc_clusters+0xa63/0xab0 [ 712.932493][T25200] ? folio_mark_accessed+0x12f/0x380 [ 712.937770][T25200] bio_alloc_bioset+0x1af/0x560 [ 712.943104][T25200] __mpage_writepage+0x9eb/0x1060 [ 712.948203][T25200] write_cache_pages+0x454/0x7f0 [ 712.953124][T25200] ? mpage_writepages+0x130/0x130 [ 712.958166][T25200] ? fat_block_truncate_page+0x30/0x30 [ 712.963693][T25200] mpage_writepages+0x7f/0x130 [ 712.968469][T25200] ? fat_block_truncate_page+0x30/0x30 [ 712.973925][T25200] ? fat_readpage+0x20/0x20 [ 712.978500][T25200] fat_writepages+0x20/0x30 [ 712.982996][T25200] do_writepages+0x1cb/0x330 [ 712.987568][T25200] ? generic_perform_write+0x1c8/0x400 [ 712.993025][T25200] ? generic_perform_write+0x397/0x400 [ 712.998493][T25200] filemap_write_and_wait_range+0x1b2/0x340 [ 713.004442][T25200] __generic_file_write_iter+0x1c5/0x2b0 [ 713.010069][T25200] generic_file_write_iter+0x75/0x130 [ 713.015436][T25200] do_iter_readv_writev+0x2de/0x380 [ 713.020758][T25200] do_iter_write+0x192/0x5c0 [ 713.025324][T25200] ? splice_from_pipe_next+0x34f/0x3b0 [ 713.030829][T25200] ? kmalloc_array+0x2d/0x40 [ 713.035395][T25200] vfs_iter_write+0x4c/0x70 [ 713.039993][T25200] iter_file_splice_write+0x43a/0x790 [ 713.045352][T25200] ? splice_from_pipe+0xd0/0xd0 [ 713.050186][T25200] direct_splice_actor+0x80/0xa0 [ 713.055104][T25200] splice_direct_to_actor+0x345/0x650 [ 713.060517][T25200] ? do_splice_direct+0x190/0x190 [ 713.065557][T25200] do_splice_direct+0x106/0x190 [ 713.070395][T25200] do_sendfile+0x675/0xc40 [ 713.074936][T25200] __x64_sys_sendfile64+0x102/0x140 [ 713.080126][T25200] do_syscall_64+0x44/0xd0 [ 713.084530][T25200] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 713.090408][T25200] RIP: 0033:0x7fe1cb921ae9 [ 713.094806][T25200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 713.114390][T25200] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 713.122787][T25200] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 713.130776][T25200] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 11:03:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 50) [ 713.138726][T25200] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 713.146712][T25200] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 713.154691][T25200] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 713.162761][T25200] [ 713.189367][T25206] loop1: detected capacity change from 0 to 262160 [ 713.201117][T25208] loop5: detected capacity change from 0 to 262160 11:03:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003b) 11:03:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002000) [ 713.233124][ T24] kauditd_printk_skb: 509 callbacks suppressed [ 713.233138][ T24] audit: type=1326 audit(1638788610.039:1072158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25187 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 713.235473][T25212] loop3: detected capacity change from 0 to 262160 [ 713.239500][ T24] audit: type=1326 audit(1638788610.039:1072159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25187 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=33 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 713.287710][T25212] FAULT_INJECTION: forcing a failure. [ 713.287710][T25212] name failslab, interval 1, probability 0, space 0, times 0 [ 713.294354][ T24] audit: type=1326 audit(1638788610.039:1072160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25187 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 713.294380][ T24] audit: type=1326 audit(1638788610.039:1072161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25187 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 713.307071][T25212] CPU: 1 PID: 25212 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 713.331207][ T24] audit: type=1326 audit(1638788610.039:1072162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25187 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 713.355371][T25212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.355384][T25212] Call Trace: [ 713.364123][ T24] audit: type=1326 audit(1638788610.039:1072163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25187 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 713.388311][T25212] [ 713.388319][T25212] dump_stack_lvl+0xd6/0x122 [ 713.398384][ T24] audit: type=1326 audit(1638788610.039:1072164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25187 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 713.401626][T25212] dump_stack+0x11/0x1b [ 713.425965][ T24] audit: type=1326 audit(1638788610.039:1072165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25187 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 713.428846][T25212] should_fail+0x23c/0x250 [ 713.433411][ T24] audit: type=1326 audit(1638788610.039:1072166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25187 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 713.457586][T25212] ? mempool_alloc_slab+0x16/0x20 [ 713.461732][ T24] audit: type=1326 audit(1638788610.039:1072167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25187 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 713.485908][T25212] __should_failslab+0x81/0x90 [ 713.485932][T25212] should_failslab+0x5/0x20 [ 713.553069][T25212] kmem_cache_alloc+0x4f/0x320 [ 713.557878][T25212] mempool_alloc_slab+0x16/0x20 [ 713.562718][T25212] ? mempool_free+0x130/0x130 [ 713.567441][T25212] mempool_alloc+0x9d/0x310 [ 713.571996][T25212] ? folio_mark_accessed+0x12f/0x380 [ 713.577319][T25212] bio_alloc_bioset+0xcc/0x560 [ 713.582077][T25212] ? time64_to_tm+0x328/0x340 [ 713.586814][T25212] submit_bh_wbc+0x133/0x320 [ 713.591497][T25212] __sync_dirty_buffer+0x136/0x1e0 [ 713.596643][T25212] sync_dirty_buffer+0x16/0x20 [ 713.601423][T25212] __fat_write_inode+0x4a4/0x4e0 [ 713.606432][T25212] fat_write_inode+0xb9/0xd0 [ 713.611017][T25212] write_inode+0x89/0x1f0 [ 713.615387][T25212] __writeback_single_inode+0x286/0x4d0 [ 713.620940][T25212] writeback_single_inode+0x11f/0x3d0 [ 713.626294][T25212] ? __down_write_common+0x42/0x7b0 [ 713.631513][T25212] ? file_check_and_advance_wb_err+0x9b/0x170 [ 713.637602][T25212] ? file_write_and_wait_range+0xe2/0x1d0 [ 713.643371][T25212] ? sync_mapping_buffers+0x33e/0x800 [ 713.648726][T25212] sync_inode_metadata+0x57/0x80 [ 713.653759][T25212] __generic_file_fsync+0xf5/0x140 [ 713.658912][T25212] fat_file_fsync+0x48/0x100 [ 713.663549][T25212] ? fat_generic_ioctl+0xb10/0xb10 [ 713.668642][T25212] vfs_fsync_range+0x107/0x120 [ 713.673428][T25212] generic_file_write_iter+0x103/0x130 [ 713.678874][T25212] do_iter_readv_writev+0x2de/0x380 [ 713.684066][T25212] do_iter_write+0x192/0x5c0 [ 713.688727][T25212] ? splice_from_pipe_next+0x34f/0x3b0 [ 713.694170][T25212] ? kmalloc_array+0x2d/0x40 [ 713.698750][T25212] vfs_iter_write+0x4c/0x70 [ 713.703266][T25212] iter_file_splice_write+0x43a/0x790 [ 713.708628][T25212] ? splice_from_pipe+0xd0/0xd0 [ 713.713487][T25212] direct_splice_actor+0x80/0xa0 [ 713.718418][T25212] splice_direct_to_actor+0x345/0x650 [ 713.723775][T25212] ? do_splice_direct+0x190/0x190 [ 713.728794][T25212] do_splice_direct+0x106/0x190 [ 713.733651][T25212] do_sendfile+0x675/0xc40 [ 713.738050][T25212] __x64_sys_sendfile64+0x102/0x140 [ 713.743229][T25212] do_syscall_64+0x44/0xd0 [ 713.747627][T25212] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 713.753539][T25212] RIP: 0033:0x7fe1cb921ae9 [ 713.757945][T25212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 713.777574][T25212] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 713.786014][T25212] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 713.793968][T25212] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 713.802024][T25212] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 713.810052][T25212] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 713.818002][T25212] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 713.825959][T25212] 11:03:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x805c40, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_loose}, {@cache_mmap}, {@access_any}, {@msize={'msize', 0x3d, 0x666ca6a2}}, {@mmap}, {@cache_mmap}], [{@smackfsroot={'smackfsroot', 0x3d, 'vfat\x00'}}, {@uid_lt={'uid<', 0xee01}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}]}}) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 11:03:30 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002300) 11:03:30 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x1c243911) keyctl$chown(0x4, r4, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r4, 0xffffffffffffffff, r5) keyctl$get_security(0x11, r4, 0x0, 0x0) keyctl$chown(0x4, r4, r2, r3) 11:03:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 51) 11:03:30 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r6, 0x1c243911) keyctl$chown(0x4, r6, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r6, 0xffffffffffffffff, r7) keyctl$get_security(0x11, r6, 0x0, 0x0) r8 = request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='syz', 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, r6, r8, 0x1) [ 713.840841][T25219] loop1: detected capacity change from 0 to 262160 [ 713.873056][T25224] loop5: detected capacity change from 0 to 262160 11:03:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003c) 11:03:30 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x1c243911) keyctl$chown(0x4, r4, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r4, 0xffffffffffffffff, r5) keyctl$get_security(0x11, r4, 0x0, 0x0) keyctl$search(0xa, r4, &(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x3}, r0) keyctl$chown(0x4, 0x0, 0xee00, r3) r6 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r6, r2, 0x0) 11:03:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002100) 11:03:30 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) socket(0x10, 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x1c243911) keyctl$chown(0x4, r1, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x1c243911) keyctl$chown(0x4, r3, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r3, 0xffffffffffffffff, r4) keyctl$get_security(0x11, r3, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r3, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xfffffffffffffe85) keyctl$chown(0x4, 0x0, 0xee00, r6) r7 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r7, r5, 0x0) [ 713.892738][T25227] loop0: detected capacity change from 0 to 262160 [ 713.926220][T25237] loop3: detected capacity change from 0 to 262160 [ 713.959709][T25240] loop1: detected capacity change from 0 to 262160 [ 713.964654][T25237] FAULT_INJECTION: forcing a failure. [ 713.964654][T25237] name failslab, interval 1, probability 0, space 0, times 0 [ 713.979306][T25237] CPU: 0 PID: 25237 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 713.988116][T25237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.998190][T25237] Call Trace: [ 714.001463][T25237] [ 714.004595][T25237] dump_stack_lvl+0xd6/0x122 11:03:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:30 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) keyctl$chown(0x4, r0, r2, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) 11:03:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003d) 11:03:30 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r5 = request_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='\xfe\\', r0) add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="ac5a926a05b450fa545590c689feda177324a93d49e58a5e4d7ad44e9868e6b18d9ed2d1fd82bf5b685009c0a3a5fbf5d28f64b3a31dd0c1d144b59d790dff63015b99acdd3c821d90f1723f79", 0x4d, r5) keyctl$chown(0x4, r4, r2, 0x0) [ 714.009225][T25237] dump_stack+0x11/0x1b [ 714.013434][T25237] should_fail+0x23c/0x250 [ 714.017854][T25237] ? mempool_alloc_slab+0x16/0x20 [ 714.022960][T25237] __should_failslab+0x81/0x90 [ 714.027785][T25237] should_failslab+0x5/0x20 [ 714.032295][T25237] kmem_cache_alloc+0x4f/0x320 [ 714.037064][T25237] mempool_alloc_slab+0x16/0x20 [ 714.041987][T25237] ? mempool_free+0x130/0x130 [ 714.046743][T25237] mempool_alloc+0x9d/0x310 [ 714.051320][T25237] ? fat_write_inode+0xb9/0xd0 [ 714.056086][T25237] bio_alloc_bioset+0xcc/0x560 [ 714.060932][T25237] ? inode_add_lru+0x6d/0x160 [ 714.065637][T25237] submit_bh_wbc+0x133/0x320 [ 714.070232][T25237] write_dirty_buffer+0xde/0xf0 [ 714.075131][T25237] sync_mapping_buffers+0x2be/0x800 [ 714.080354][T25237] ? file_check_and_advance_wb_err+0x9b/0x170 [ 714.086457][T25237] fat_file_fsync+0xa9/0x100 [ 714.091031][T25237] ? fat_generic_ioctl+0xb10/0xb10 [ 714.096142][T25237] vfs_fsync_range+0x107/0x120 [ 714.101057][T25237] generic_file_write_iter+0x103/0x130 [ 714.106565][T25237] do_iter_readv_writev+0x2de/0x380 [ 714.111911][T25237] do_iter_write+0x192/0x5c0 [ 714.116489][T25237] ? splice_from_pipe_next+0x34f/0x3b0 [ 714.121931][T25237] ? kmalloc_array+0x2d/0x40 [ 714.126623][T25237] vfs_iter_write+0x4c/0x70 [ 714.131171][T25237] iter_file_splice_write+0x43a/0x790 [ 714.136548][T25237] ? splice_from_pipe+0xd0/0xd0 [ 714.141379][T25237] direct_splice_actor+0x80/0xa0 [ 714.146295][T25237] splice_direct_to_actor+0x345/0x650 [ 714.151648][T25237] ? do_splice_direct+0x190/0x190 [ 714.156711][T25237] do_splice_direct+0x106/0x190 [ 714.161655][T25237] do_sendfile+0x675/0xc40 [ 714.166145][T25237] __x64_sys_sendfile64+0x102/0x140 [ 714.171365][T25237] do_syscall_64+0x44/0xd0 [ 714.175773][T25237] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 714.181676][T25237] RIP: 0033:0x7fe1cb921ae9 [ 714.186171][T25237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.205792][T25237] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 714.214365][T25237] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 714.222322][T25237] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 714.230356][T25237] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.238428][T25237] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 714.246502][T25237] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 714.254496][T25237] [ 714.270342][T25253] loop5: detected capacity change from 0 to 262160 11:03:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 52) 11:03:31 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r8 = dup2(r7, r7) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r6, 0xc0189378, &(0x7f0000000200)={{0x1, 0x1, 0x18, r5, {r6}}, './file0\x00'}) sendmsg$AUDIT_LIST_RULES(r9, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f5, 0x10, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "7b2df29a0c408adcec23b83a2de7b943d2479c59c32af113af186cb4371f67050980fb7bed4baa4574549254ffc57be39f57e0d0f76468d1845ace0bfb8a1c4d", 0x39}, 0x48, 0xfffffffffffffff9) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0xc0182101, &(0x7f00000001c0)) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r11 = dup2(r10, r10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r11, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r11, 0xc0182101, &(0x7f00000001c0)={r12}) r13 = socket$l2tp(0x2, 0x2, 0x73) sendfile(r13, r8, &(0x7f00000003c0)=0xf9, 0x4) 11:03:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002200) 11:03:31 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002600) 11:03:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x210200, 0x0) sendfile(r0, r1, 0x0, 0x80000001) [ 714.314406][T25257] loop1: detected capacity change from 0 to 262160 [ 714.315077][T25258] loop0: detected capacity change from 0 to 262160 11:03:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003e) 11:03:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x3f, 0x5, 0x0, 0x40, 0x0, 0x8, 0x404, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5eee, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0x3ff, 0xffff, 0x7, 0x200000000, 0x73c, 0x1, 0x0, 0x80000000, 0x0, 0x5}, 0x0, 0x8, r0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) [ 714.364853][T25266] loop3: detected capacity change from 0 to 262160 [ 714.366999][T25265] loop5: detected capacity change from 0 to 262160 [ 714.380879][T25269] loop0: detected capacity change from 0 to 262160 11:03:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002300) [ 714.407282][T25266] FAULT_INJECTION: forcing a failure. [ 714.407282][T25266] name failslab, interval 1, probability 0, space 0, times 0 [ 714.420161][T25266] CPU: 1 PID: 25266 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 714.428920][T25266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.438962][T25266] Call Trace: [ 714.442231][T25266] [ 714.445150][T25266] dump_stack_lvl+0xd6/0x122 [ 714.449812][T25266] dump_stack+0x11/0x1b [ 714.453980][T25266] should_fail+0x23c/0x250 [ 714.458387][T25266] ? mempool_alloc_slab+0x16/0x20 [ 714.463478][T25266] __should_failslab+0x81/0x90 [ 714.468288][T25266] should_failslab+0x5/0x20 [ 714.472777][T25266] kmem_cache_alloc+0x4f/0x320 [ 714.477585][T25266] mempool_alloc_slab+0x16/0x20 [ 714.482433][T25266] ? mempool_free+0x130/0x130 [ 714.487172][T25266] mempool_alloc+0x9d/0x310 [ 714.491672][T25266] ? submit_bio_noacct+0x49f/0x4e0 [ 714.496954][T25266] bio_alloc_bioset+0xcc/0x560 [ 714.501748][T25266] submit_bh_wbc+0x133/0x320 [ 714.506376][T25266] write_dirty_buffer+0xde/0xf0 [ 714.511267][T25266] sync_mapping_buffers+0x2be/0x800 [ 714.516452][T25266] ? file_check_and_advance_wb_err+0x9b/0x170 [ 714.522565][T25266] fat_file_fsync+0xa9/0x100 [ 714.527142][T25266] ? fat_generic_ioctl+0xb10/0xb10 [ 714.532316][T25266] vfs_fsync_range+0x107/0x120 [ 714.537072][T25266] generic_file_write_iter+0x103/0x130 [ 714.542513][T25266] do_iter_readv_writev+0x2de/0x380 [ 714.547816][T25266] do_iter_write+0x192/0x5c0 [ 714.552412][T25266] ? splice_from_pipe_next+0x34f/0x3b0 [ 714.557983][T25266] ? kmalloc_array+0x2d/0x40 [ 714.562588][T25266] vfs_iter_write+0x4c/0x70 [ 714.567187][T25266] iter_file_splice_write+0x43a/0x790 [ 714.572559][T25266] ? splice_from_pipe+0xd0/0xd0 [ 714.577425][T25266] direct_splice_actor+0x80/0xa0 [ 714.582404][T25266] splice_direct_to_actor+0x345/0x650 [ 714.587767][T25266] ? do_splice_direct+0x190/0x190 [ 714.592791][T25266] do_splice_direct+0x106/0x190 [ 714.597632][T25266] do_sendfile+0x675/0xc40 [ 714.602104][T25266] __x64_sys_sendfile64+0x102/0x140 [ 714.607359][T25266] do_syscall_64+0x44/0xd0 [ 714.611778][T25266] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 714.617653][T25266] RIP: 0033:0x7fe1cb921ae9 [ 714.622043][T25266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.641697][T25266] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 714.650113][T25266] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 11:03:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 53) [ 714.658183][T25266] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 714.666132][T25266] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.674109][T25266] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 714.682072][T25266] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 714.690025][T25266] 11:03:31 executing program 0: chdir(&(0x7f0000000140)='./file0\x00') r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x7f, 0x0, 0x40, 0x5, 0x0, 0xc0, 0x2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x3, @perf_bp={&(0x7f0000000040), 0x5}, 0x4040c, 0x85f2, 0x2, 0x6, 0x7f, 0x2, 0x9, 0x0, 0x7ff, 0x0, 0x7ff}, 0xffffffffffffffff, 0x0, r0, 0x8) sendfile(r3, r2, &(0x7f0000000180)=0x5, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 11:03:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000041) [ 714.711910][T25276] loop0: detected capacity change from 0 to 262160 [ 714.713321][T25277] loop1: detected capacity change from 0 to 262160 [ 714.760535][T25284] loop3: detected capacity change from 0 to 262160 [ 714.766404][T25285] loop5: detected capacity change from 0 to 262160 [ 714.787717][T25284] FAULT_INJECTION: forcing a failure. [ 714.787717][T25284] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 714.801006][T25284] CPU: 0 PID: 25284 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 11:03:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002400) [ 714.809822][T25284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.819921][T25284] Call Trace: [ 714.823269][T25284] [ 714.826196][T25284] dump_stack_lvl+0xd6/0x122 [ 714.830886][T25284] dump_stack+0x11/0x1b [ 714.835122][T25284] should_fail+0x23c/0x250 [ 714.839525][T25284] __alloc_pages+0x102/0x330 [ 714.844133][T25284] alloc_pages+0x382/0x3d0 [ 714.848548][T25284] folio_alloc+0x1a/0x20 [ 714.852781][T25284] filemap_alloc_folio+0x53/0xf0 [ 714.857782][T25284] __filemap_get_folio+0x443/0x690 [ 714.863044][T25284] pagecache_get_page+0x26/0xe0 [ 714.868423][T25284] grab_cache_page_write_begin+0x3f/0x50 [ 714.874607][T25284] cont_write_begin+0x4ab/0x7b0 [ 714.879458][T25284] fat_write_begin+0x61/0xf0 [ 714.884055][T25284] ? fat_block_truncate_page+0x30/0x30 [ 714.889557][T25284] generic_perform_write+0x1c8/0x400 [ 714.894934][T25284] __generic_file_write_iter+0x195/0x2b0 [ 714.900615][T25284] ? generic_write_checks+0x250/0x290 [ 714.906034][T25284] generic_file_write_iter+0x75/0x130 [ 714.911506][T25284] do_iter_readv_writev+0x2de/0x380 [ 714.916709][T25284] do_iter_write+0x192/0x5c0 [ 714.921297][T25284] ? splice_from_pipe_next+0x34f/0x3b0 [ 714.926804][T25284] ? kmalloc_array+0x2d/0x40 [ 714.931454][T25284] vfs_iter_write+0x4c/0x70 [ 714.935946][T25284] iter_file_splice_write+0x43a/0x790 [ 714.941309][T25284] ? splice_from_pipe+0xd0/0xd0 [ 714.946142][T25284] direct_splice_actor+0x80/0xa0 [ 714.951103][T25284] splice_direct_to_actor+0x345/0x650 [ 714.956459][T25284] ? do_splice_direct+0x190/0x190 [ 714.961469][T25284] do_splice_direct+0x106/0x190 [ 714.966378][T25284] do_sendfile+0x675/0xc40 [ 714.970786][T25284] __x64_sys_sendfile64+0x102/0x140 [ 714.975966][T25284] do_syscall_64+0x44/0xd0 [ 714.980387][T25284] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 714.986373][T25284] RIP: 0033:0x7fe1cb921ae9 [ 714.990788][T25284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 715.010444][T25284] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 715.018842][T25284] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 715.026978][T25284] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 715.034929][T25284] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 715.042974][T25284] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 715.050925][T25284] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 715.058956][T25284] 11:03:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 54) [ 715.076955][T25291] loop1: detected capacity change from 0 to 262160 11:03:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000042) 11:03:31 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) socket(0x10, 0x2, 0x0) add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="d63b03a2a9cdee60cedb8b9ff55432924ade29a9cde1c44250cc0b2276bc987709834c1250e4238edac0bc3e5d33f6faa8cacf542ba1c70e05c7a9a2f6205fb7d32208be0ba79a4aa3366d3c31dc5cc361a0c8b36bccbb87a6575081168e312486db2cd9b33920edde567e4aef2d6b462a170fbdb30a", 0x76, r0) r1 = socket$qrtr(0x2a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xffffffffffffffb7) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) [ 715.123643][T25296] loop3: detected capacity change from 0 to 262160 [ 715.132159][T25297] loop5: detected capacity change from 0 to 262160 [ 715.153857][T25303] loop1: detected capacity change from 0 to 262160 [ 715.162452][T25296] FAULT_INJECTION: forcing a failure. [ 715.162452][T25296] name failslab, interval 1, probability 0, space 0, times 0 [ 715.175135][T25296] CPU: 1 PID: 25296 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 715.184110][T25296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.194215][T25296] Call Trace: [ 715.197488][T25296] [ 715.200418][T25296] dump_stack_lvl+0xd6/0x122 [ 715.205376][T25296] dump_stack+0x11/0x1b [ 715.209548][T25296] should_fail+0x23c/0x250 [ 715.213993][T25296] ? xas_create+0x94b/0xb10 [ 715.218506][T25296] __should_failslab+0x81/0x90 [ 715.223392][T25296] should_failslab+0x5/0x20 [ 715.227931][T25296] kmem_cache_alloc+0x4f/0x320 [ 715.232744][T25296] xas_create+0x94b/0xb10 [ 715.237061][T25296] xas_store+0x70/0xca0 [ 715.241290][T25296] ? xas_find_conflict+0x422/0x4c0 [ 715.246457][T25296] __filemap_add_folio+0x1e8/0x4d0 [ 715.251557][T25296] ? workingset_activation+0x2b0/0x2b0 [ 715.257086][T25296] filemap_add_folio+0x6b/0x150 [ 715.262065][T25296] __filemap_get_folio+0x4c4/0x690 [ 715.267210][T25296] pagecache_get_page+0x26/0xe0 [ 715.272151][T25296] grab_cache_page_write_begin+0x3f/0x50 [ 715.277769][T25296] cont_write_begin+0x4ab/0x7b0 [ 715.282598][T25296] fat_write_begin+0x61/0xf0 [ 715.287211][T25296] ? fat_block_truncate_page+0x30/0x30 [ 715.292779][T25296] generic_perform_write+0x1c8/0x400 [ 715.298155][T25296] __generic_file_write_iter+0x195/0x2b0 [ 715.304055][T25296] ? generic_write_checks+0x250/0x290 [ 715.309510][T25296] generic_file_write_iter+0x75/0x130 [ 715.314879][T25296] do_iter_readv_writev+0x2de/0x380 [ 715.320080][T25296] do_iter_write+0x192/0x5c0 [ 715.324761][T25296] ? splice_from_pipe_next+0x34f/0x3b0 [ 715.330229][T25296] ? kmalloc_array+0x2d/0x40 [ 715.334819][T25296] vfs_iter_write+0x4c/0x70 [ 715.339359][T25296] iter_file_splice_write+0x43a/0x790 [ 715.344923][T25296] ? splice_from_pipe+0xd0/0xd0 [ 715.349761][T25296] direct_splice_actor+0x80/0xa0 [ 715.354791][T25296] splice_direct_to_actor+0x345/0x650 [ 715.360162][T25296] ? do_splice_direct+0x190/0x190 [ 715.365233][T25296] do_splice_direct+0x106/0x190 [ 715.370159][T25296] do_sendfile+0x675/0xc40 [ 715.374601][T25296] __x64_sys_sendfile64+0x102/0x140 [ 715.379837][T25296] do_syscall_64+0x44/0xd0 [ 715.384258][T25296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 715.390275][T25296] RIP: 0033:0x7fe1cb921ae9 [ 715.394742][T25296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 715.414507][T25296] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 11:03:32 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002900) 11:03:32 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r6 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @auto=[0x64, 0x34, 0x64, 0x36, 0x35, 0x61, 0x33, 0x0, 0x30, 0x66, 0x35, 0x66, 0x38, 0x32, 0x62, 0x65]}, &(0x7f00000002c0)={0x0, "833ff958b00efa1dcf9c3a28741621d50906b859cdc91a77294623a32c5b8cae25da0929795fc1518efe0c9f960b9d1365c260b22b875badae08d0860cb0c90e", 0x22}, 0x48, r0) keyctl$setperm(0x5, r6, 0x20020) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x52, @mcast2, @mcast1, 0x1, 0x80, 0x8, 0xde22ccf}}) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000001540)=@newtfilter={0x1400, 0x2c, 0x400, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0xb, 0xc}, {0x0, 0xfff2}, {0xffe0}}, [@TCA_RATE={0x6, 0x5, {0x3, 0x1}}, @TCA_CHAIN={0x8, 0xb, 0x8000}, @TCA_CHAIN={0x8, 0xb, 0xffffffff}, @TCA_RATE={0x6, 0x5, {0x0, 0x7}}, @filter_kind_options=@f_tcindex={{0xc}, {0x13a8, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_ACT={0x1394, 0x7, [@m_ipt={0x1144, 0x8, 0x0, 0x0, {{0x8}, {0x11c, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TARG={0xe9, 0x6, {0xb4c, 'mangle\x00', 0x5, 0x7f, "ae191cc0e9fedca1d4ef29c75af931a65dd30107ea6d3f2a20220035535b1205fbe378c38b063e0e8caf07f34ae18c5a8401a30e224f3367c21f11341dc229431fb343f80d9b09a1465a1fd4c9fc112b92bc2694716b3fb6d3e9247a57ee65a968e0945efc2b1417afc7bba8769feb99b781b2ad25af12fac33b105973650ac7ac7484722de8699d963b2f38994872b5c21e54593b4d1330e66f1bdaa975e3bcfca9754cdb5623ef55164ddc9bf020171e6a08fe55981c97e9f24cc71cc5b7"}}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_ct={0xa0, 0x19, 0x0, 0x0, {{0x7}, {0x18, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @private0}]}, {0x61, 0x6, "2c8ce039df8abb4e22f8e82ea57566318c143eae491f6271e2e7f7cb470f3c4ce34cad2292d5dc969ac77b67094eb1697b8045d1f10225daab8148e48b9a07a8bebb7f8b42c3c0bb611d2bcdee4256481b1fbb818615689c40ae16872d"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_csum={0x1ac, 0x1d, 0x0, 0x0, {{0x9}, {0xc8, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x2, 0x3, 0x4, 0x0, 0x80000001}, 0xd}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x54, 0x343, 0x8, 0x1, 0x578}, 0x77}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x6, 0x4234, 0x6, 0x1, 0xe412}, 0x5d}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x7, 0x2, 0x3, 0x7ff}, 0x78}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xec5, 0x100, 0x3, 0x3, 0x8001}, 0x30}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x7f, 0x0, 0x3, 0xa4aee386, 0x8}, 0x15}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x3, 0x1000, 0x1, 0x0, 0x401}, 0x5d}}]}, {0xbb, 0x6, "e8e372b2d9270fff25ca9ddb8e193a163b58597082108f7257bbc231932a53df3d8f19f05b85bc230451d99a40750ca34d607e7f9b421a8452956b0413804d583ab4d35b9909f49b187d6c84936b3e7fdb75c74ad756f2492cec3c1743a427667a587c29227cf30aaa4dad5fd821fb623c9586fa65a391242ebbf2eb59fcf3eefdcc6d330b55000e8bdad034fcab64d81a668c201adcd26b35493a8c3c9468a63e8803fd7e2b664341656b1f6258c6e3f0176bd1eb3eb0"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}, @TCA_TCINDEX_MASK={0x6, 0x2, 0xfff8}]}}, @TCA_RATE={0x6, 0x5, {0x40, 0x7}}]}, 0x1400}, 0x1, 0x0, 0x0, 0x22cac186b75ebd08}, 0x15) 11:03:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002500) 11:03:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000043) 11:03:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17, 0x2}, {0x0, 0x0, 0x10000001000}], 0xa0748f213a981738, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) ioctl$AUTOFS_IOC_FAIL(r1, 0x9361, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) sendfile(r2, r0, &(0x7f00000000c0), 0x80000000) [ 715.422952][T25296] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 715.431018][T25296] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 715.438985][T25296] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 715.447069][T25296] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 715.455363][T25296] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 715.463324][T25296] 11:03:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 55) 11:03:32 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) socket(0x10, 0x2, 0x0) request_key(&(0x7f0000000f00)='blacklist\x00', &(0x7f0000000f40)={'syz', 0x3}, &(0x7f0000000f80)=',)]^!\x11\x00', 0xfffffffffffffffd) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r2 = dup2(r1, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0xc0182101, &(0x7f00000001c0)={r3}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000fc0)=0xc) r6 = socket$rds(0x15, 0x5, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r7, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x40400000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x54, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x3f}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x6}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x93}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x1a}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x20}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x7d}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008000}, 0xc814) recvmmsg(r6, &(0x7f0000000d00)=[{{&(0x7f00000001c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000240)=""/173, 0xad}, {&(0x7f0000000300)=""/84, 0x54}, {&(0x7f0000000380)=""/57, 0x39}, {&(0x7f00000003c0)=""/78, 0x4e}], 0x4, &(0x7f0000000480)=""/163, 0xa3}, 0x7}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000540)=""/51, 0x33}], 0x1, &(0x7f00000005c0)=""/78, 0x4e}}, {{&(0x7f0000000640)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000000740)=[{&(0x7f00000006c0)=""/96, 0x60}], 0x1, &(0x7f0000000780)=""/125, 0x7d}, 0x1a2}, {{&(0x7f0000000800)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000880)=""/109, 0x6d}, {&(0x7f0000000900)=""/71, 0x47}, {&(0x7f0000000980)=""/166, 0xa6}, {&(0x7f0000001440)=""/4096, 0x3dd}, {&(0x7f0000000a40)=""/92, 0x5c}, {&(0x7f0000000ac0)=""/36, 0x24}, {&(0x7f0000000b00)=""/243, 0xf3}, {&(0x7f0000000c00)=""/125, 0x7d}], 0x8, &(0x7f0000002440)=""/4096, 0x1000}, 0xe4}], 0x4, 0x0, &(0x7f0000000e00)) keyctl$chown(0x4, 0x0, 0xee00, r5) r8 = add_key$user(&(0x7f0000000140), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000000040)="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", 0xfc, r0) keyctl$chown(0x4, r8, r4, 0x0) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r10 = dup2(r9, r9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r10, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r10, 0xc0182101, &(0x7f00000001c0)={r11}) getpeername(r10, &(0x7f0000000e40)=@l2tp={0x2, 0x0, @initdev}, &(0x7f0000000ec0)=0x80) [ 715.488771][T25311] loop0: detected capacity change from 0 to 262160 [ 715.528789][T25317] loop5: detected capacity change from 0 to 262160 11:03:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000044) 11:03:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002600) [ 715.533702][T25320] loop1: detected capacity change from 0 to 262160 [ 715.535960][T25319] loop3: detected capacity change from 0 to 262160 [ 715.597825][T25319] FAULT_INJECTION: forcing a failure. [ 715.597825][T25319] name failslab, interval 1, probability 0, space 0, times 0 [ 715.610515][T25319] CPU: 0 PID: 25319 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 715.619297][T25319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.629691][T25319] Call Trace: [ 715.632964][T25319] [ 715.635891][T25319] dump_stack_lvl+0xd6/0x122 [ 715.640475][T25319] dump_stack+0x11/0x1b [ 715.644669][T25319] should_fail+0x23c/0x250 [ 715.649092][T25319] ? fat_cache_add+0x1f7/0x4f0 [ 715.653856][T25319] __should_failslab+0x81/0x90 [ 715.658649][T25319] should_failslab+0x5/0x20 [ 715.663305][T25319] kmem_cache_alloc+0x4f/0x320 [ 715.668095][T25319] fat_cache_add+0x1f7/0x4f0 [ 715.672721][T25319] fat_get_cluster+0x5ca/0x890 [ 715.677486][T25319] fat_get_mapped_cluster+0xe0/0x260 [ 715.682769][T25319] fat_bmap+0x258/0x290 [ 715.687005][T25319] fat_get_block+0x3cb/0x610 [ 715.691581][T25319] __block_write_begin_int+0x4c5/0x1010 [ 715.697387][T25319] ? fat_block_truncate_page+0x30/0x30 [ 715.702847][T25319] cont_write_begin+0x4cf/0x7b0 [ 715.707688][T25319] fat_write_begin+0x61/0xf0 [ 715.712348][T25319] ? fat_block_truncate_page+0x30/0x30 [ 715.717933][T25319] generic_perform_write+0x1c8/0x400 [ 715.723225][T25319] __generic_file_write_iter+0x195/0x2b0 [ 715.728887][T25319] ? generic_write_checks+0x250/0x290 [ 715.734316][T25319] generic_file_write_iter+0x75/0x130 [ 715.739780][T25319] do_iter_readv_writev+0x2de/0x380 [ 715.745006][T25319] do_iter_write+0x192/0x5c0 [ 715.749758][T25319] ? splice_from_pipe_next+0x34f/0x3b0 [ 715.755220][T25319] vfs_iter_write+0x4c/0x70 [ 715.759785][T25319] iter_file_splice_write+0x43a/0x790 [ 715.765182][T25319] ? splice_from_pipe+0xd0/0xd0 [ 715.770030][T25319] direct_splice_actor+0x80/0xa0 [ 715.774993][T25319] splice_direct_to_actor+0x345/0x650 [ 715.780386][T25319] ? do_splice_direct+0x190/0x190 [ 715.785477][T25319] do_splice_direct+0x106/0x190 [ 715.790317][T25319] do_sendfile+0x675/0xc40 [ 715.794788][T25319] __x64_sys_sendfile64+0x102/0x140 [ 715.799974][T25319] do_syscall_64+0x44/0xd0 [ 715.804377][T25319] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 715.810272][T25319] RIP: 0033:0x7fe1cb921ae9 [ 715.814821][T25319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 715.834562][T25319] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 11:03:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 56) 11:03:32 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x6, 0xfffffffe) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) [ 715.843120][T25319] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 715.851075][T25319] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 715.859082][T25319] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 715.867052][T25319] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 715.875006][T25319] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 715.883179][T25319] 11:03:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17, 0xac}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='statm\x00') perf_event_open(0x0, 0x0, 0x0, r0, 0x8) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 715.908352][T25331] loop1: detected capacity change from 0 to 262160 [ 715.910953][T25311] loop0: detected capacity change from 0 to 262160 [ 715.921950][T25333] loop5: detected capacity change from 0 to 262160 [ 715.962177][T25338] loop3: detected capacity change from 0 to 262160 [ 715.972855][T25340] loop0: detected capacity change from 0 to 262160 [ 715.983647][T25340] FAT-fs (loop0): bogus number of reserved sectors [ 715.990368][T25340] FAT-fs (loop0): Can't find a valid FAT filesystem [ 715.996685][T25338] FAULT_INJECTION: forcing a failure. [ 715.996685][T25338] name failslab, interval 1, probability 0, space 0, times 0 [ 716.009598][T25338] CPU: 1 PID: 25338 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 716.018429][T25338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.028492][T25338] Call Trace: [ 716.031760][T25338] [ 716.034715][T25338] dump_stack_lvl+0xd6/0x122 [ 716.039305][T25338] dump_stack+0x11/0x1b [ 716.043510][T25338] should_fail+0x23c/0x250 [ 716.047906][T25338] ? fat_cache_add+0x1f7/0x4f0 [ 716.052757][T25338] __should_failslab+0x81/0x90 [ 716.057607][T25338] should_failslab+0x5/0x20 [ 716.062115][T25338] kmem_cache_alloc+0x4f/0x320 [ 716.066938][T25338] fat_cache_add+0x1f7/0x4f0 [ 716.071565][T25338] fat_get_cluster+0x5ca/0x890 [ 716.076316][T25338] fat_truncate_blocks+0x29a/0x580 [ 716.081825][T25338] fat_write_begin+0xd0/0xf0 [ 716.086447][T25338] generic_perform_write+0x1c8/0x400 [ 716.091743][T25338] __generic_file_write_iter+0x195/0x2b0 [ 716.097457][T25338] ? generic_write_checks+0x250/0x290 [ 716.102818][T25338] generic_file_write_iter+0x75/0x130 [ 716.108200][T25338] do_iter_readv_writev+0x2de/0x380 [ 716.113402][T25338] do_iter_write+0x192/0x5c0 [ 716.117989][T25338] vfs_iter_write+0x4c/0x70 [ 716.122480][T25338] iter_file_splice_write+0x43a/0x790 [ 716.127899][T25338] ? splice_from_pipe+0xd0/0xd0 [ 716.132858][T25338] direct_splice_actor+0x80/0xa0 [ 716.137794][T25338] splice_direct_to_actor+0x345/0x650 [ 716.143274][T25338] ? do_splice_direct+0x190/0x190 [ 716.148382][T25338] do_splice_direct+0x106/0x190 [ 716.153240][T25338] do_sendfile+0x675/0xc40 [ 716.157638][T25338] __x64_sys_sendfile64+0x102/0x140 [ 716.163026][T25338] do_syscall_64+0x44/0xd0 [ 716.167480][T25338] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 716.173422][T25338] RIP: 0033:0x7fe1cb921ae9 [ 716.177819][T25338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 716.197497][T25338] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 716.205977][T25338] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 716.213931][T25338] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 716.221925][T25338] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 716.229880][T25338] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 716.237927][T25338] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 716.245989][T25338] 11:03:33 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002c00) 11:03:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002700) 11:03:33 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r2) r3 = request_key(&(0x7f0000001280)='keyring\x00', &(0x7f00000012c0)={'syz', 0x1}, &(0x7f0000001300)='%-)^\xf6.^$$\x00', r0) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x1c243911) keyctl$chown(0x4, r4, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r4, 0xffffffffffffffff, r5) keyctl$get_security(0x11, r4, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r6, 0x1c243911) keyctl$chown(0x4, r6, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$link(0x8, r3, 0x0) keyctl$revoke(0x3, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @private=0xa010101}, {0x2, 0x4e24, @remote}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}, 0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='ipvlan0\x00', 0x9, 0xfff, 0x7fff}) r7 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x4, r7, r1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000011c0)={'filter\x00', 0x0, 0x3, 0x1000, [0x100, 0x40, 0x0, 0x8000, 0x8, 0x2], 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000001c0)=""/4096}, &(0x7f0000001240)=0x78) 11:03:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000045) 11:03:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 57) 11:03:33 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000000040)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) 11:03:33 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000000040)="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", 0x10b, r0) keyctl$chown(0x4, r4, r2, 0x0) [ 716.313864][T25350] loop5: detected capacity change from 0 to 262160 [ 716.322066][T25349] loop1: detected capacity change from 0 to 262160 [ 716.334860][T25355] loop3: detected capacity change from 0 to 262160 11:03:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002800) 11:03:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000046) 11:03:33 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = socket(0x10, 0x2, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='keyring\x00', 0xfffffffffffffffb) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r2) r3 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)="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", 0xfc, 0xfffffffffffffffd) keyctl$chown(0x4, r3, r1, 0x0) [ 716.389102][T25340] loop0: detected capacity change from 0 to 262160 [ 716.405334][T25340] FAT-fs (loop0): Unrecognized mount option "statm" or missing value [ 716.415997][T25355] FAULT_INJECTION: forcing a failure. [ 716.415997][T25355] name failslab, interval 1, probability 0, space 0, times 0 [ 716.428693][T25355] CPU: 0 PID: 25355 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 11:03:33 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0xb, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = add_key(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="c358245ecf2b55e4dfa57f0dd8793b17a60a431e42f34eb15317dd090ac1575e5300d2699bab533d6ef442eba038d6d7003d710d5c", 0x35, r0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, 0x0, r2, r6) keyctl$get_security(0x11, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, r4, &(0x7f0000000600)=ANY=[@ANYBLOB='load ecryptfd: 00000000000000028726 6\x00', @ANYRES16=r4, @ANYRES16, @ANYRES16, @ANYRESDEC=r6, @ANYRES16, @ANYRESDEC], 0x2e, 0x0) r7 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r7) r8 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r5) add_key(&(0x7f0000000440)='pkcs7_test\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="b5ecf8f9aab31af63ee5c0c4ad9eea202be9c8017f44484b8c680574e8df2013db339831bd2bcc2dbdbb6ce24145733c451d0897a868812cf341729a93abfe6de0a8dd6f02ee39953084c5200ec607fc9440903cc4cd831ecd983b9c763d62d60494927a215d896cc731e260adeeb59b5d3f0c9fd4f25143bd833fcbc2657c13c2502e6ef9b7914b462612e59ed070dd27e5d54c19511e684b1d9d68559df01df2554f68d01fe4d9094b0743c35f099e91f67655fe20a3ca18779bcc2444e4ec0042de5c59af96d7cf68ac1150e695607a23890af5cc73", 0xd7, r8) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0x22, &(0x7f0000000300)=0x7, 0x4) add_key$keyring(&(0x7f0000000040), &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f00000000c0)='cifs.spnego\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='-\x00', 0xfffffffffffffffe) [ 716.437469][T25355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.447522][T25355] Call Trace: [ 716.450801][T25355] [ 716.453749][T25355] dump_stack_lvl+0xd6/0x122 [ 716.458350][T25355] dump_stack+0x11/0x1b [ 716.462575][T25355] should_fail+0x23c/0x250 [ 716.466999][T25355] ? fat_cache_add+0x1f7/0x4f0 [ 716.471777][T25355] __should_failslab+0x81/0x90 [ 716.476682][T25355] should_failslab+0x5/0x20 [ 716.481297][T25355] kmem_cache_alloc+0x4f/0x320 [ 716.486155][T25355] fat_cache_add+0x1f7/0x4f0 [ 716.490754][T25355] fat_get_cluster+0x5ca/0x890 [ 716.495530][T25355] fat_truncate_blocks+0x29a/0x580 [ 716.500737][T25355] fat_write_begin+0xd0/0xf0 [ 716.505333][T25355] generic_perform_write+0x1c8/0x400 [ 716.510678][T25355] __generic_file_write_iter+0x195/0x2b0 [ 716.516303][T25355] ? generic_write_checks+0x250/0x290 [ 716.521742][T25355] generic_file_write_iter+0x75/0x130 [ 716.527104][T25355] do_iter_readv_writev+0x2de/0x380 [ 716.532300][T25355] do_iter_write+0x192/0x5c0 [ 716.537027][T25355] ? splice_from_pipe_next+0x34f/0x3b0 [ 716.542578][T25355] ? kmalloc_array+0x2d/0x40 [ 716.547241][T25355] vfs_iter_write+0x4c/0x70 [ 716.551748][T25355] iter_file_splice_write+0x43a/0x790 [ 716.557116][T25355] ? splice_from_pipe+0xd0/0xd0 [ 716.561992][T25355] direct_splice_actor+0x80/0xa0 [ 716.566967][T25355] splice_direct_to_actor+0x345/0x650 [ 716.572448][T25355] ? do_splice_direct+0x190/0x190 [ 716.577454][T25355] do_splice_direct+0x106/0x190 [ 716.582296][T25355] do_sendfile+0x675/0xc40 [ 716.586692][T25355] __x64_sys_sendfile64+0x102/0x140 [ 716.591920][T25355] do_syscall_64+0x44/0xd0 [ 716.596404][T25355] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 716.602275][T25355] RIP: 0033:0x7fe1cb921ae9 [ 716.606854][T25355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 716.626438][T25355] RSP: 002b:00007fe1cb098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 11:03:33 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x1c243911) keyctl$chown(0x4, r5, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r5, 0xffffffffffffffff, r6) keyctl$get_security(0x11, r5, 0x0, 0x0) request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='syz', r5) keyctl$chown(0x4, r4, r2, 0x0) [ 716.634834][T25355] RAX: ffffffffffffffda RBX: 00007fe1cba34f60 RCX: 00007fe1cb921ae9 [ 716.642831][T25355] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 716.650963][T25355] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 [ 716.658922][T25355] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 716.666880][T25355] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 716.674896][T25355] [ 716.713954][T25381] loop5: detected capacity change from 0 to 262160 [ 716.722617][T25383] loop1: detected capacity change from 0 to 262160 11:03:33 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002f00) 11:03:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 58) 11:03:33 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = geteuid() setresuid(r2, 0x0, 0xffffffffffffffff) quotactl(0xa01, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000003300)="4d846e3b748a988aae8997bb3c82c4248e8dc43044cff32d4010f9881f42c5dbc86b2109d86035f94f501aee0959cd31113fdbe865de138cba42cceaf270512d9af86f7580f63d49ce7444505e521e2315f5ac1e6d11a84e15962181cad1648ab5e15f22ccc8") r3 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000300)={0xfffffffffffffffc, [{}, {}, {}, {}, {0x0, 0x0}], 0x0, "85aeed5224481d"}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000001300)={{0x0, 0x9d, 0x7, 0x5, 0x5, 0xff, 0x0, 0xfffffff9, 0xff, 0x0, 0x39, 0x5, 0x0, 0x7fff}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000002300)={r4, r5, "a79cbcc6c148fb31b3b82cea6dc67decdfaa7358191dc724b399ca9e1969556ba731f638195a66d5d16c55d880f39a2b02a1d9b1a771a121d01a5a29942b7429b980e620ee7276524b69c62a72953eca4c8cfe3d3689bb63b5d11ec8ddac61c929d1a8f66db514a821632eaa33ea79269449ba8ad886cea72631b081710ca9f29c3c133ae69e99729c3fe40bc4d4c6998ebc9545c1586f631776465717a76e0b0fb743d1707211397e29e99f840ec0d039ccf6c9b011b7a7c67910f06da170b2572e7a96d873b030781a830910d439f9c3b322c9e94086fa56a6221d63fbd06c57836c4b58e3fd44b563c050db156c4f197998f05b9134595704be569aab4e33", "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"}) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000180), &(0x7f00000001c0)={'U+', 0x6}, 0x16, 0x3) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x80000001) r7 = syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000003380)='./bus\x00', 0x3, 0x6, &(0x7f0000004640)=[{&(0x7f00000033c0)="e6ff8d112ccb368f37fa1253e8c9093113fdee818019269344d6fd68ae1f4dfd25815427a406fb8d65b735cb15a8563f2a160ccc549cb23481d4190267169eae702970961a142743ede0e70dc683534e33e480523e34f1d9cf961265c2585ed0c222b9140d6c3b17867210d1511ceda629ff5160b2dea750206b2846d416b73c896a090f71ddd69f004bf49756cd47c6bde055430b187061cc8895f662d27080a76edb3b6f6ea6a97a4154d2c24c611c74578e9bd4a88a7d4ea84e408833ebcfd31ae9d08f7df58fd330582b4c574ddea8116c9eb27ef56c0f42dfca723d1f3b7527cffe3b5db64b5598e80d33607e52860cbd6f", 0xf4, 0x7f}, {&(0x7f00000034c0)="caee086b94d307536dc805185292c8ff89fea660934be1d367522ace3e21a1b4c7f011166be651b7c25de736990ac3d43dfd2d1962b37aba3349ddb331179ba148c9a0c748803404cc36e6b7e35d5baebb8e820ae531947d410908a279a7d96623ffc4eb26dd8c59187d1e0df36c542dbf8370b262bf9f4350919a", 0x7b, 0xb176}, {&(0x7f0000003540)="79b693ce573feea7664fc6b28fce7088ae036214f45d3f552b0383cca0c26ee6a21b87fbcbb2db0f1adaad66c40b7a86f12ba81fa0a9b143e67229ffa1aeff9a9c7be674d5023d94beb46ab1", 0x4c, 0x7}, {&(0x7f00000035c0)="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", 0x1000, 0x20}, {&(0x7f00000045c0)="963dc7e34dadd8f2f1a29c29e0", 0xd, 0x46}, {&(0x7f0000004600)="fcee479a22b7f37e", 0x8, 0x1}], 0x10000, &(0x7f0000004700)={[{@gid={'gid', 0x3d, 0xee01}}, {@uid={'uid', 0x3d, r2}}, {@huge_advise}, {@gid}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x30, 0x35, 0x33, 0x36, 0x74]}}, {@uid={'uid', 0x3d, r2}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x32, 0x35]}}], [{@pcr={'pcr', 0x3d, 0x1}}, {@subj_user={'subj_user', 0x3d, '.{)?#'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) 11:03:33 executing program 2: sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x4c, 0x453, 0x300, 0x70bd26, 0x25dfdbfe, "f0414cdaa8262575cc5041bc7f0a8c637cab2391dfc7f055b365617aa3b3134f1a884678d7c90115c1561e35665cba0394348d81288e5ff29d7d", ["", "", ""]}, 0x4c}, 0x1, 0x0, 0x0, 0xc1}, 0x21) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x10001, 0x2040) bind$can_raw(r0, &(0x7f00000000c0), 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000240)={0x2, 0x0, 0x1, 'queue0\x00', 0x3ff}) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r4) r5 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r1) keyctl$chown(0x4, r5, r3, 0x0) r6 = creat(&(0x7f0000000600)='./file0\x00', 0x80) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r6, 0x40605346, &(0x7f0000000640)={0x800, 0x0, {0x3, 0x1, 0x7fffffff, 0x1, 0x10001}, 0xc72}) r7 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "b0e6f963629fb8dd0dacd69f8f0784a8eb6af1e063cf265942cc8550dac20c258024575262d835e7080dd50252d6410c743fc3051c3de6dfc24bb6344beee3dd", 0x3a}, 0x48, r1) keyctl$setperm(0x5, r7, 0x32000422) recvmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000440)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x110}, 0x2100) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f00000004c0)={[{@fat=@gid={'gid', 0x3d, r10}}]}) setgroups(0x5, &(0x7f00000005c0)=[r4, r8, 0x0, r10, r4]) 11:03:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002900) 11:03:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000047) [ 716.796386][T25391] loop3: detected capacity change from 0 to 262160 [ 716.798167][T25392] loop0: detected capacity change from 0 to 262160 [ 716.811939][T25394] loop1: detected capacity change from 0 to 262160 [ 716.818939][T25396] loop5: detected capacity change from 0 to 262160 [ 716.832191][T25391] FAULT_INJECTION: forcing a failure. [ 716.832191][T25391] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 716.845316][T25391] CPU: 0 PID: 25391 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 716.854078][T25391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.864141][T25391] Call Trace: [ 716.867420][T25391] [ 716.870357][T25391] dump_stack_lvl+0xd6/0x122 [ 716.874958][T25391] dump_stack+0x11/0x1b [ 716.879207][T25391] should_fail+0x23c/0x250 [ 716.883658][T25391] should_fail_usercopy+0x16/0x20 [ 716.889063][T25391] _copy_from_user+0x1c/0xd0 11:03:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000048) [ 716.893678][T25391] kstrtouint_from_user+0x7e/0x170 [ 716.898881][T25391] proc_fail_nth_write+0x4b/0x150 [ 716.903949][T25391] ? proc_fail_nth_read+0x150/0x150 [ 716.909155][T25391] vfs_write+0x2af/0x950 [ 716.913566][T25391] ? __fget_files+0x20d/0x220 [ 716.918317][T25391] ksys_write+0xd9/0x190 [ 716.922691][T25391] __x64_sys_write+0x3e/0x50 [ 716.927298][T25391] do_syscall_64+0x44/0xd0 [ 716.931726][T25391] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 716.937665][T25391] RIP: 0033:0x7fe1cb8d45ff [ 716.942090][T25391] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 716.961708][T25391] RSP: 002b:00007fe1cb098170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 716.970160][T25391] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe1cb8d45ff [ 716.978252][T25391] RDX: 0000000000000001 RSI: 00007fe1cb0981e0 RDI: 0000000000000006 [ 716.986251][T25391] RBP: 00007fe1cb0981d0 R08: 0000000000000000 R09: 0000000000000000 11:03:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002a00) 11:03:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:33 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r2) r3 = add_key$user(&(0x7f00000013c0), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, 0xfffffffffffffffa) keyctl$chown(0x4, r3, r1, 0x0) [ 716.994282][T25391] R10: 0000000080000001 R11: 0000000000000293 R12: 0000000000000002 [ 717.002309][T25391] R13: 00007ffdf469e34f R14: 00007fe1cb098300 R15: 0000000000022000 [ 717.010290][T25391] 11:03:33 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) sendmsg(r1, &(0x7f0000000140)={&(0x7f0000000040)=@llc={0x1a, 0xf, 0x9b, 0x7f, 0x2, 0x1, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="85636e298b694f9a68ba75754f1dd2", 0xf}, {&(0x7f00000001c0)="1980485a925aa5860912db1c8e205d90da412223c7f4587758c817d8f49ccdc0d5da003107c32eb4c19ef7afe0717cf5612fbd70cec04f3a1c2c38168d4a21b86bf311b40cc9ba1aaf26a9cef08e91cba5d6f8935269a573a48446ec9a4ff06548f01f6931193e21847a7508ec9dab722bab2d19f6ad3243482c28269972582dbb85b63209795b13a31655d513fba0e39c8e132476d94306cfd6b3f0a72532cbd78833e19baa95fbbd8f47d38b7e26aee55e558d98f8", 0xb6}], 0x2, &(0x7f0000000280)=[{0x108, 0x10f, 0x1, "6f2042886eef6b7114de158480fa6ce0f7a5e5c193d1e556d425e14147b7c1b004855a36dadd97b631e9daee9e23639160571cc98d216a82d446d5a8fb394f24f045b990d5d45fc5c5d7eb7c9811014640f2dfe1de5ca9aba797c07f762df1881ddf84f297e642a640b2c9085440ae465b458656e945ea92e30691081a029a61caf88ec4c919c8e042d74646f09ed3729bcc9102c0a1b1ea791c191fae5d0ae44baa1fd9548dbfa7f1dcad480abe50ab5a59736619caaaa0ebd53dde68f236389096a2d0c3220f1d7dd9fed4d2d06f98054c91c0d3eb6d186b966a1ad54af94817b8aa67c52e5e35a58d2439384afab77ca6"}, {0xa8, 0x88, 0x0, "2a64376ecf0d29ed8d96d2d7c82d20222a8268b0b7f696492a91d6d028f7f41d293440e311593c528d3858c0388bcb0720ff4e4289189653b64f4ab3eae430f2623d55403ca3b486b9d0c2f2bd52668d368c005393c67559fab264ccf587e2e8ef4233d939c049175b494b750dbc41e9fe6b7d492f5b844b068c700bc038cf741bab0729331aaae9a99c0db26cf38cf576"}, {0x78, 0x110, 0x4, "e6b29e5bfc5f70e62e05f672180bd37dce78997aa9f9ef7f2dac400396321ca5989b8daa6d1de5be81b21d882728b8c15a805c52324098afa60751e5dcecf05b25abc8fbb73fc6e224a5cf07ab70fa943b08f92835bfac428d9b805d1e0b49754acff57d8a812969"}, {0x50, 0x1, 0x8, "aa02b1bcd69150647c406c35babef8713b864edeaf389aba3152aaec40e7abe32497d8bab7486459eb9c422164ec48685dbd97dea83230de34ae9110"}, {0xf8, 0x84, 0x0, "d834ddbb71d6a91f465056d951de7f7073d54ee448652479aa0b0b62e25c222b7f1e82dce840a01f9beefd88a0c01b81ce89925e289d43a2f49b266d987f3c67814fe4380a141ee2f8429c872ec5687e4969f5371d99052ebd9d1af40d60b72720e4d85074b47f25653819f0d6eb789d0d30339b7d74c2e54a6496ffaecb2b1ac73973716d134aa56012656c34daf97a9f9516aff5b5d19dfdf10eeb5513397df037d1c84d22e40d572119d693c9918e37ba5ab1accaf066277d3e8848d2d4c3bd5cfcfedb198c01e87a896ba4f20f22e6064d038f44d73bd1700f581e4d483ee74bf2"}, {0x70, 0x118, 0x80000001, "1c045261717f9992d58c96f6e1d95fafd6ce1f20311b95a4757efa35440e3062f001226b5143ae724d6673805cb98f36660a1f78761f364c719f293597233f3484bb710f144101d8aa67f61d88ef03a59a64dd48ae72512e86258d89abeebf"}], 0x3e0}, 0x40) [ 717.075928][T25410] loop5: detected capacity change from 0 to 262160 [ 717.081437][T25408] loop1: detected capacity change from 0 to 262160 11:03:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002b00) [ 717.190071][T25417] loop3: detected capacity change from 0 to 262160 [ 717.212144][T25419] loop5: detected capacity change from 0 to 262160 11:03:34 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003200) 11:03:34 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f00000004c0)={[{@fat=@gid={'gid', 0x3d, r7}}]}) keyctl$chown(0x4, r4, r5, r7) keyctl$chown(0x4, r4, r2, 0x0) 11:03:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000049) 11:03:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffff000) 11:03:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002c00) [ 717.374914][T25426] loop1: detected capacity change from 0 to 262160 [ 717.378846][T25429] loop3: detected capacity change from 0 to 262160 [ 717.381840][T25428] loop5: detected capacity change from 0 to 262160 11:03:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000002) 11:03:34 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x80) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f00000001c0)={0x2, 'sit0\x00', {0x3}, 0x3}) 11:03:34 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x3, 0xcb2, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000ce4], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x0, 0x4a, 0x8863, 'bond_slave_0\x00', 'veth1_to_hsr\x00', 'syzkaller1\x00', 'bond0\x00', @local, [0x0, 0xff, 0x0, 0x80, 0x0, 0xff], @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff], 0xbe, 0xf6, 0x12e, [@helper={{'helper\x00', 0x0, 0x28}, {{0x0, 'sane-20000\x00'}}}], [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffd}}}], @arpreply={'arpreply\x00', 0x10, {{@multicast, 0xfffffffffffffffe}}}}, {0x3, 0x41, 0x5, 'batadv_slave_0\x00', 'syzkaller0\x00', 'hsr0\x00', 'veth1_to_team\x00', @broadcast, [0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0xff, 0x0, 0xff], 0x95e, 0x95e, 0x996, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x6, 0x1}}}, @among={{'among\x00', 0x0, 0x898}, {{@offset, @offset, 0x2, {[0xffff, 0x7, 0x61f, 0x7, 0xff, 0x5, 0x1f, 0x200, 0x55d2, 0x3, 0x7f, 0x76, 0x1000, 0x0, 0x6, 0x101, 0x660, 0x6, 0x2, 0x3, 0x7, 0xfffffffa, 0xfffffffa, 0x671, 0x208, 0x5, 0x3, 0x1, 0x63cb, 0x8, 0x5, 0x5, 0x7, 0x8, 0x8, 0x5, 0x7fff, 0x1000, 0x27c2, 0xe4, 0x2, 0x8, 0x539cccdd, 0x1, 0x2a, 0x467d, 0x2ac, 0xdf, 0x6, 0xfff, 0x2, 0xd9a, 0x8, 0xff, 0x7, 0x2, 0x10001, 0x81, 0x3, 0x0, 0x1, 0xfffffffa, 0x8000, 0x1, 0x3ff, 0x3, 0x1, 0x2, 0x1, 0x5, 0xffff, 0x8, 0x6, 0x81, 0x8001, 0x4, 0x3, 0xe4, 0x4, 0x3ff, 0x3, 0x52b5, 0x1, 0x1f, 0x7, 0x3, 0x400, 0x61, 0x80, 0x2, 0x2, 0x6, 0x2d50, 0x6700, 0x5, 0x5, 0x7f1f, 0x9, 0x8, 0x5, 0x3ff, 0x0, 0x3, 0x1ff, 0x1, 0x5, 0x7, 0x7, 0x656a1705, 0xff, 0xffff, 0xffffffff, 0x7, 0x40, 0xcf8d, 0x2, 0xe6d, 0x8, 0x80000001, 0x4, 0x1f, 0x6, 0x10001, 0xff, 0x8, 0x1, 0x1, 0x4, 0x3f, 0x7ff, 0x800, 0x3f, 0x9, 0xfff, 0x6, 0xfffff001, 0x1ff, 0x6, 0x8a9, 0xffff, 0xffffffff, 0x5, 0xb39, 0x101, 0x0, 0xbf6, 0x10001, 0x4, 0x10001, 0x7fffffff, 0xba, 0x4, 0x100, 0x8, 0x4, 0xffff, 0xf3, 0x400, 0xfffffff7, 0xb2f8, 0x3742, 0x40, 0x2, 0x7fffffff, 0x2, 0x20, 0xe43, 0x80000000, 0x4, 0x80000001, 0x20, 0x20, 0xc3b, 0x5, 0x5, 0x2263, 0x5523, 0x8001, 0x4, 0xdf76, 0xffffff05, 0xab, 0xfffffff9, 0x74f3, 0x1, 0x10001, 0x3, 0x63908087, 0x9, 0x5, 0x0, 0x6, 0x8, 0x1000, 0x8, 0x800, 0x78, 0xeca1, 0x6, 0x6, 0x6, 0x401, 0x3, 0x80000001, 0x2, 0xdcb7, 0x0, 0x3, 0x7e7, 0x1ff, 0x1, 0x6, 0x0, 0x7e05668f, 0x7, 0x7, 0xfffffffd, 0x20, 0x800000, 0x0, 0x4, 0x26243f8a, 0x2, 0x3, 0x5, 0x9, 0xfffffffb, 0x7ff, 0x3, 0x7, 0x3c52392f, 0x80000000, 0x5, 0xffffffb4, 0x0, 0x8000, 0x20, 0x20, 0x7, 0x0, 0x400, 0x5, 0x0, 0xffff7fff, 0xffffffff, 0x5ae76a12, 0x40, 0x7, 0x7c935255, 0x4, 0x2, 0x3, 0x6, 0x9, 0x0, 0x1, 0x9f11], 0x3, [{[0x9, 0x9], @dev={0xac, 0x14, 0x14, 0x17}}, {[0x97c, 0x7], @multicast2}, {[0x101, 0x5], @local}]}, {[0xffffffa1, 0xcf, 0x9, 0x1, 0x401, 0x2, 0x3, 0x7, 0x2, 0x9, 0x4, 0x6, 0xde, 0x8, 0xfff, 0xffff, 0x5f, 0xfffffff0, 0xbd9, 0x0, 0x8, 0x0, 0x8, 0x5, 0x0, 0x1, 0x9, 0x7fffffff, 0x8, 0x6, 0xffffffff, 0x7fff, 0x3, 0x1f, 0x0, 0x9, 0x3, 0x1, 0xfffffffa, 0x8, 0xff, 0xfff, 0x4, 0x1, 0xbf28, 0x7fff, 0x8, 0x8, 0x6, 0x4, 0x5, 0x38fd3f60, 0x0, 0x4, 0x2, 0x2020, 0x81, 0x8000, 0x5, 0x0, 0x1000, 0x8, 0x7, 0x4, 0x7, 0x9e, 0x7, 0x80000001, 0x6, 0x7, 0x8b, 0x4, 0x80000000, 0x20, 0x4, 0xeb2, 0x41cd, 0x44, 0x0, 0x1, 0x7, 0x1, 0x9, 0xffff6e56, 0xfffffff9, 0x8001, 0x7, 0xd6, 0x3, 0xffff7fff, 0x5, 0x3595, 0x81, 0x7fff, 0xac85, 0x6, 0x1000, 0x75f5caec, 0x5cc40000, 0x8, 0xffff0001, 0x80000001, 0xc0aa, 0x8, 0x80000001, 0x20, 0x6f3c, 0x2, 0x1, 0x3, 0x80000000, 0x3, 0x7, 0x50, 0x1ff, 0x1, 0x8, 0x3, 0x1, 0x1f, 0xfff, 0x1, 0xffff4c13, 0x40, 0x1f, 0x1f, 0x0, 0xfffff801, 0x5, 0xe6, 0x3, 0x9, 0x84da, 0x7, 0x1000, 0xffffffff, 0x3, 0x400, 0x0, 0x4c, 0x8e2, 0x0, 0x80, 0xd69, 0x7, 0x9a5, 0x9, 0x0, 0x0, 0x4, 0x4, 0x80000001, 0xf6b8, 0x2, 0x7, 0xfffffffc, 0x13bb, 0xa9, 0x5, 0xf6d, 0x100, 0x5, 0x4, 0x9055, 0x4, 0x0, 0x7, 0xcb6, 0x8000, 0x9, 0xbf66, 0x80, 0x5, 0x8, 0x1be, 0xe3c8, 0x400, 0x7, 0x10001, 0x5, 0x5419, 0x2, 0x4, 0x8b62, 0x5, 0x40000000, 0x1ff, 0x401, 0x3, 0x57, 0x1c, 0xb, 0x9, 0xf3b, 0xfff, 0xd119, 0x6662, 0x8e8a, 0x95, 0xc96, 0x4, 0x7, 0x0, 0x6, 0x2c81, 0x401, 0x8, 0x9, 0x7f, 0x7cc, 0xb641, 0x29eb, 0x85, 0x480, 0x5ece3f0f, 0x4, 0xdd, 0x8001, 0x4, 0xfffffffc, 0x8, 0x8c91, 0xfffffff7, 0x7, 0x5, 0x5, 0x80000000, 0x0, 0xfffffffe, 0x0, 0x1, 0x9, 0x7f, 0x0, 0x9, 0x1ff, 0x4, 0x800, 0x7f, 0x5, 0x8, 0xffffff80, 0x6, 0x6, 0x401, 0xffffffff, 0x6, 0x4, 0x7, 0x3, 0x7f, 0x5, 0xffffffff, 0x1, 0x0, 0x7, 0x6], 0x7, [{[0x1, 0x400], @remote}, {[0x7fff, 0x9], @loopback}, {[0x3f, 0xa23b], @dev={0xac, 0x14, 0x14, 0x1d}}, {[0x4, 0xfffff800], @broadcast}, {[0xfffffffe, 0x9e2b], @loopback}, {[0x3, 0x3f], @remote}, {[0x2, 0x800], @local}]}}}}], [], @common=@mark={'mark\x00', 0x10, {{0xffffffc0, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x3, 0x1, 0x5, 'bond_slave_0\x00', 'veth0_virt_wifi\x00', 'lo\x00', 'dummy0\x00', @multicast, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], 0x116, 0x116, 0x15e, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'vlan0\x00', {}, 'macvlan1\x00', {0xff}, 0x1, 0xa}}}, @cluster={{'cluster\x00', 0x0, 0x10}, {{0x80, 0x1, 0xfffffffc, 0x1}}}], [], @common=@ERROR={'ERROR\x00', 0x20, {"bc835ec6558fed88bbd7a065c0af7e335d9deba651826965cc54fa43846c"}}}]}]}, 0xd2a) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) 11:03:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004a) [ 717.481940][T25436] loop3: detected capacity change from 0 to 262160 11:03:34 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r1) sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x100, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_QOS_MAP={0xc, 0xc7, {[], "bb935f7590401d13"}}]}, 0x20}, 0x1, 0x0, 0x0, 0xc000}, 0x25ea3298dfa06406) r5 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r6 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r6) keyctl$chown(0x4, r5, r2, 0x0) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="ba5cfa16b73c7b37f3ecf3c52aa863b7b48e4f9cb37c5e4befbbca3dfb0235e98835a5abeee340e6e3ae676ab2c9b637bf5927", 0x33, 0xfffffffffffffff9) 11:03:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002d00) 11:03:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000003) [ 717.553920][T25446] loop1: detected capacity change from 0 to 262160 [ 717.610950][T25452] loop5: detected capacity change from 0 to 262160 [ 717.622031][T25455] loop3: detected capacity change from 0 to 262160 11:03:34 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003500) 11:03:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004b) 11:03:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002e00) 11:03:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000004) [ 717.746105][T25463] loop5: detected capacity change from 0 to 262160 [ 717.750659][T25466] loop1: detected capacity change from 0 to 262160 [ 717.753229][T25465] loop3: detected capacity change from 0 to 262160 11:03:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004c) 11:03:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000005) 11:03:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80002f00) 11:03:34 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r2) r3 = socket$nl_route(0x10, 0x3, 0x0) connect(r3, &(0x7f0000000040)=@llc={0x1a, 0x17, 0x3f, 0x0, 0x5, 0x5}, 0x80) add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r4 = geteuid() setresuid(r4, 0x0, 0xffffffffffffffff) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000002c0)={0x0, [], 0x0, "2156816c73038c"}) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x7, 0x0, 0x0, 0x20, 0x0, 0x4}, 0x0, 0x0, r6, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057a00)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r7, 0xd000943d, 0x0) [ 717.886140][T25471] loop1: detected capacity change from 0 to 262160 [ 717.912283][T25473] loop5: detected capacity change from 0 to 262160 [ 717.926649][T25477] loop3: detected capacity change from 0 to 262160 11:03:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004d) 11:03:34 executing program 2: ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000000040)={0x0, 0x5}) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x25, 0x2, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r5 = dup2(r4, r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0xc0182101, &(0x7f00000001c0)={r6}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000080)={0x8, 'syzkaller0\x00', {'veth1_macvtap\x00'}, 0x7ff}) r7 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r7, r2, 0x0) 11:03:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003000) 11:03:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000006) 11:03:34 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003800) [ 718.046860][T25487] loop1: detected capacity change from 0 to 262160 [ 718.074227][T25489] loop5: detected capacity change from 0 to 262160 [ 718.082602][T25491] loop3: detected capacity change from 0 to 262160 11:03:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004e) 11:03:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003100) 11:03:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000007) [ 718.217739][T25499] loop5: detected capacity change from 0 to 262160 [ 718.229295][T25501] loop1: detected capacity change from 0 to 262160 [ 718.239630][T25503] loop3: detected capacity change from 0 to 262160 11:03:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003200) 11:03:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000008) 11:03:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004f) 11:03:35 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003b00) 11:03:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000058c40)={0xffffffffffffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000058a00)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057ec0)={0x0, ""/256, 0x0, 0x0}) r11 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r11, 0xd000943d, &(0x7f0000058c40)={0xffffffffffffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}], 0x1, "2156816c73038c"}) r13 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r13, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000059a00)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005aa00)={0xae79, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {r9}, {r15}, {r17}], 0x1, "7ad4a9ea98f796"}) r18 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r18, 0x0, 0x80000001) [ 718.353493][T25509] loop5: detected capacity change from 0 to 262160 [ 718.369576][T25511] loop3: detected capacity change from 0 to 262160 [ 718.378086][T25513] loop1: detected capacity change from 0 to 262160 [ 718.458176][T25519] loop0: detected capacity change from 0 to 262160 [ 718.864097][ T24] kauditd_printk_skb: 813 callbacks suppressed [ 718.864110][ T24] audit: type=1326 audit(1638788615.669:1072981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25484 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 718.894915][ T24] audit: type=1326 audit(1638788615.669:1072982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25484 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=33 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 718.919097][ T24] audit: type=1326 audit(1638788615.669:1072983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25484 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 718.943948][ T24] audit: type=1326 audit(1638788615.669:1072984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25484 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 718.968282][ T24] audit: type=1326 audit(1638788615.669:1072985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25484 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 718.992532][ T24] audit: type=1326 audit(1638788615.669:1072986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25484 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 719.016782][ T24] audit: type=1326 audit(1638788615.669:1072987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25484 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003300) 11:03:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000009) 11:03:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000050) 11:03:35 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003e00) [ 719.041193][ T24] audit: type=1326 audit(1638788615.669:1072988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25484 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 719.065692][ T24] audit: type=1326 audit(1638788615.669:1072989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25484 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 719.090101][ T24] audit: type=1326 audit(1638788615.679:1072990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25484 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:35 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)) r1 = pidfd_getfd(r0, r0, 0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) dup2(r0, r0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file1\x00', 0x3, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x108018, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x161) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 11:03:35 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r2) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'wlan0\x00', {0x2, 0x0, @dev}}) r3 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r5, @ANYBLOB="220065a437173c1170b3f2c5534543d9e348997f0fbcc1499901814142d84c97a992927233df37357ae89fa3b9c334f55f36a14676af2b1ebb5b97d1683c3a3fef5e6c043836102099e1bf4f33ba737eb973f3d992592520bdb04f249c81ae322c737c04335017b35cea37501f4af28cf46d5bc61d6417249a56fc92"]) r6 = getuid() newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) keyctl$chown(0x4, r3, r6, r7) [ 719.131585][T25531] loop1: detected capacity change from 0 to 262160 [ 719.133198][T25528] loop5: detected capacity change from 0 to 262160 [ 719.141746][T25533] loop0: detected capacity change from 0 to 262160 [ 719.149282][T25535] loop3: detected capacity change from 0 to 262160 11:03:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000051) 11:03:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) [ 719.196751][T25537] FAT-fs (loop2): Unrecognized mount option "gid=0x00000000ffffff00"" or missing value 11:03:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003400) [ 719.261177][T25542] loop1: detected capacity change from 0 to 262160 [ 719.275947][T25544] FAT-fs (loop2): Unrecognized mount option "gid=0x00000000ffffff00"" or missing value 11:03:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x400, 0x80) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e21, 0x32, @remote, 0x1}, 0x1c) 11:03:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000052) 11:03:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000b) 11:03:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000040)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="9ed3b3dc9baa00176bf83f2a75b593d941b9e9813524a7a2b30d9c202640a20414cd2bac94f7a2f5723569cbea31778ce56a70bf6bb97aadaa558dc647ba5a1e92f92ef7060a3e5a52938bb0769e9d603511297226ef91b613644f", 0x5b, 0xfffffffffffffffd) 11:03:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) r2 = add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r4) r5 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r5, r3, 0x0) 11:03:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003500) [ 719.304239][T25547] loop3: detected capacity change from 0 to 262160 [ 719.312687][T25533] loop0: detected capacity change from 0 to 262160 [ 719.323986][T25551] loop5: detected capacity change from 0 to 262160 11:03:36 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004000) 11:03:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0), &(0x7f0000000180), 0x2, 0x3) sendfile(r0, r1, 0x0, 0x80000001) 11:03:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r1) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r3, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x44810}, 0x800) keyctl$chown(0x4, 0x0, 0xee00, r2) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r5 = dup2(r4, r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0xc0182101, &(0x7f00000001c0)={r6}) setsockopt$llc_int(r5, 0x10c, 0x9, &(0x7f00000001c0)=0x400, 0x4) r7 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) r8 = geteuid() setresuid(r8, 0x0, 0xffffffffffffffff) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f00000004c0)={[{@fat=@gid={'gid', 0x3d, r10}}]}) keyctl$chown(0x4, r7, r8, r10) 11:03:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000053) [ 719.398960][T25566] loop1: detected capacity change from 0 to 262160 [ 719.408521][T25569] loop3: detected capacity change from 0 to 262160 [ 719.421346][T25571] loop0: detected capacity change from 0 to 262160 [ 719.421932][T25572] loop5: detected capacity change from 0 to 262160 11:03:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x1010004, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000c) 11:03:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003600) [ 719.471840][T25577] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25577 comm=syz-executor.2 11:03:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000054) 11:03:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f00000000c0)) sendfile(r1, r2, 0x0, 0x80000001) [ 719.540238][T25582] loop1: detected capacity change from 0 to 262160 [ 719.557907][T25584] loop0: detected capacity change from 0 to 262160 [ 719.569480][T25586] loop3: detected capacity change from 0 to 262160 [ 719.580243][T25588] loop5: detected capacity change from 0 to 262160 11:03:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003700) 11:03:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000d) 11:03:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) sendto(0xffffffffffffffff, &(0x7f00000005c0)="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", 0x1000, 0x800, &(0x7f00000015c0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) chdir(&(0x7f0000000140)='./file0\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000003f40)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r3 = dup2(r2, r2) recvmmsg(r1, &(0x7f0000003e40)=[{{&(0x7f00000003c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000440)=""/194, 0xc2}, {&(0x7f0000001640)=""/155, 0x9b}], 0x2, &(0x7f0000000200)=""/39, 0x27}, 0x7}, {{&(0x7f0000000540)=@ax25={{0x3, @default}, [@remote, @bcast, @null, @default, @netrom, @default, @null, @default]}, 0x80, &(0x7f0000000280)=[{&(0x7f0000001700)=""/255, 0xff}], 0x1}, 0x3f}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001800)=""/152, 0x98}, {&(0x7f00000018c0)=""/206, 0xce}, {&(0x7f00000019c0)=""/147, 0x93}, {&(0x7f0000000300)=""/42, 0x2a}, {&(0x7f0000001a80)=""/10, 0xa}], 0x5, &(0x7f0000001b40)=""/4096, 0x1000}, 0xdacc}, {{&(0x7f0000002b40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000003d40)=[{&(0x7f0000002bc0)=""/98, 0x62}, {&(0x7f0000002c40)=""/126, 0x7e}, {&(0x7f0000002cc0)=""/4096, 0x1000}, {&(0x7f0000003cc0)=""/80, 0x50}], 0x4, &(0x7f0000003d80)=""/144, 0x90}, 0x7}], 0x4, 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0xc0182101, &(0x7f00000001c0)={r4}) getdents64(r3, &(0x7f00000000c0)=""/51, 0x33) sendfile(r0, r1, 0x0, 0x80000001) [ 719.641041][T25596] loop0: detected capacity change from 0 to 262160 [ 719.641261][T25597] loop1: detected capacity change from 0 to 262160 [ 719.660834][T25600] loop5: detected capacity change from 0 to 262160 [ 719.664494][T25603] loop3: detected capacity change from 0 to 262160 11:03:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003800) 11:03:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000055) [ 719.712876][T25609] loop0: detected capacity change from 0 to 262160 [ 719.769016][T25613] loop5: detected capacity change from 0 to 262160 [ 719.771930][T25612] loop1: detected capacity change from 0 to 262160 [ 720.303652][T25593] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25593 comm=syz-executor.2 11:03:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x1c243911) keyctl$chown(0x4, r0, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r0, 0xffffffffffffffff, r1) keyctl$get_security(0x11, r0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) r6 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r2) keyctl$chown(0x4, r6, r4, 0x0) 11:03:37 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004300) 11:03:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000e) 11:03:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003900) 11:03:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000056) 11:03:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x800, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$sock_proto_private(r1, 0x89e0, &(0x7f00000001c0)="88ac93d173896259f4bce53711af2d6c9493347e56825fa3efd59bf416fa81ac8e18ff188a7596077f57991493de68ab2d103ffa70faad597f998fdf1e26e4a0cdf88390c3cadcb06b5a9cf2bf1222fe8e0f1983ca65c2f07f9fcfa1e4131b22caa41d0405e729b3feadb21957d4af98670d302195ac3655a6740547f8d8c367c25bae5c7ebbe9020b73d0b50204661be5c3726fa445928fce05ee7dd23e679c4efa21cc16678bce19a148fb667258592a8d6b78090c3c639fba87c090ea5c037acf870e0360d5a5ea2ea320834f95c35265") add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) [ 720.445490][T25624] loop5: detected capacity change from 0 to 262160 [ 720.448632][T25626] loop3: detected capacity change from 0 to 262160 [ 720.452383][T25625] loop1: detected capacity change from 0 to 262160 11:03:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f00000001c0)='keyring\x00', r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x9) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) setsockopt(r1, 0x9, 0x3, &(0x7f0000000040)="dd380d02eb55fb2e08fa3ffb2971e4c8d76978e4f97d889cac288a5bf046fa527907c902a17c5d72a37d5cace95be1f05cfe9c5074ddaba09791bcd5ce8e31528fc70426492e91d8c75c84efd518f50f437245210ff116473a40a68b680c0b2adf9a73d2ab5d75c676267690586c03b2aec67840b94491b1d260f20dec1c28096b56e6dab419e7034efc9239829fbbff3cf805", 0x93) keyctl$chown(0x4, r0, r2, r3) 11:03:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003a00) 11:03:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000057) 11:03:37 executing program 0: bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x11, 0x0, 0x1, 0x6c, 0x6, @broadcast}, 0x14) r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80000001) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) r3 = socket$phonet(0x23, 0x2, 0x1) sendfile(r3, r0, 0x0, 0x2) sendfile(r2, r3, &(0x7f0000000180)=0x8, 0x7) 11:03:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000f) 11:03:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='user\x00', r0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x1c243911) keyctl$chown(0x4, r3, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r3, 0xffffffffffffffff, r4) keyctl$get_security(0x11, r3, 0x0, 0x0) stat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r3, r6, r5) r7 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r7, r2, 0x0) [ 720.606187][T25642] loop1: detected capacity change from 0 to 262160 [ 720.606830][T25641] loop5: detected capacity change from 0 to 262160 11:03:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x65, 0x4, 0x7, "d99b0ab9cfa8495ad47c084627e8ccf0", "6693e629de0b90ab20f5cbd1a0ed5b136a4fb1a399b6059f5c9618fc5b9ceb4087446e22bdb552d531e4f8dfa69af6a75426de5049e55cf935335b87aee2d52e73b55d388f389e77aea7fa340d822c9c"}, 0x65, 0x4) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r2 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x4, r2, 0x0, 0x0) [ 720.662668][T25648] loop3: detected capacity change from 0 to 262160 [ 720.688486][T25654] loop0: detected capacity change from 0 to 262160 11:03:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003b00) 11:03:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000058) 11:03:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0x1e8, 0x0, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_LINKMODES_OURS={0x1bc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_BITS={0x88, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\x93%--.*\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'user\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7df3}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'user\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0xb3, 0x5, "2b7ded9ff5dcbb91460d4e805f112800d0dba3e253914f6accbd0116dc9a49f5254b6de3f7e3e34f1bb7ff8247ef859c47f4f975f6f678fd1f3c04f2a667e43831c46d44d68ab57b445b2c09528a19b03d05842b5028eb542ea508e88701e87d3957940349d9ff1f6faa5acba013c6a7116ec9e890f98404d5fac68912ebe7b88d384ae387e0d4feb251240506219632ee26048402c7f79aabf7141f752d08fbe2a5e5e1b4a53ee6f3b2b0057b1525"}, @ETHTOOL_A_BITSET_VALUE={0x69, 0x4, "991dffa6deaf1c80d072b91af96978c05c8b1cceb6851c790c6872f718a436efa6514fade3ff708e99c55a1beb6b790b3ef632c39ea8b947fc4245c36e1a618c15fb70a078fd462467a2a814acd5c441a216b7797e909c5c0b3d5fad5c05eca1eb7bbd1a32"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xa687}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x8010}, 0x40) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r3 = dup2(r2, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0xc0182101, &(0x7f00000001c0)={r4}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0}) r8 = pidfd_getfd(r6, r3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r7}) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f00000000c0)={0x7fff, 0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xfffffffffffffeae) keyctl$chown(0x4, 0x0, 0xee00, r10) r11 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r11, r9, 0x0) 11:03:37 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004400) 11:03:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x10) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000010) 11:03:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003c00) [ 720.803806][T25666] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25666 comm=syz-executor.2 [ 720.805437][T25668] loop1: detected capacity change from 0 to 262160 [ 720.818816][T25667] loop3: detected capacity change from 0 to 262160 [ 720.831812][T25663] loop5: detected capacity change from 0 to 262160 [ 720.832013][T25670] loop0: detected capacity change from 0 to 262160 11:03:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000059) 11:03:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000011) 11:03:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005a) [ 720.919290][T25679] loop5: detected capacity change from 0 to 262160 [ 720.922010][T25680] FAT-fs (loop0): bogus number of reserved sectors [ 720.932424][T25680] FAT-fs (loop0): Can't find a valid FAT filesystem [ 720.948338][T25682] loop1: detected capacity change from 0 to 262160 [ 720.955713][T25685] loop3: detected capacity change from 0 to 262160 11:03:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003d00) 11:03:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000012) 11:03:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003e00) [ 721.056293][T25692] loop1: detected capacity change from 0 to 262160 [ 721.065027][T25693] loop5: detected capacity change from 0 to 262160 [ 721.072316][T25695] loop3: detected capacity change from 0 to 262160 [ 721.113623][T25680] FAT-fs (loop0): bogus number of reserved sectors [ 721.120246][T25680] FAT-fs (loop0): Can't find a valid FAT filesystem [ 721.174077][T25702] loop5: detected capacity change from 0 to 262160 11:03:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005b) 11:03:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000013) 11:03:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x400, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:38 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004800) 11:03:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003f00) 11:03:38 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x5, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r5) keyctl$get_security(0x11, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r4, r2, 0x0) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='user\x00', r0) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r6, 0x1c243911) keyctl$chown(0x4, r6, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r6, 0xffffffffffffffff, r7) keyctl$get_security(0x11, r6, 0x0, 0x0) r8 = geteuid() setresuid(r8, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r6, r8, r3) [ 722.110199][T25707] loop3: detected capacity change from 0 to 262160 [ 722.117771][T25711] loop5: detected capacity change from 0 to 262160 [ 722.120105][T25710] loop1: detected capacity change from 0 to 262160 [ 722.125005][T25712] loop0: detected capacity change from 0 to 262160 11:03:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) keyctl$get_security(0x11, r0, &(0x7f0000000040)=""/138, 0x8a) 11:03:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005c) 11:03:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000014) 11:03:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004000) 11:03:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r3 = dup2(r2, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0xc0182101, &(0x7f00000001c0)={r4}) faccessat(r3, &(0x7f00000000c0)='./file0\x00', 0xd0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f0000000180)=[{0x1, 0x0, 0x4, 0x5}, {0x1, 0xbf, 0x3, 0x4}, {0x1, 0x3, 0x4, 0x9}]}) 11:03:39 executing program 2: r0 = geteuid() setresuid(r0, 0x0, 0xffffffffffffffff) lchown(&(0x7f0000000040)='./file0\x00', r0, 0xee00) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r4) r5 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r1) keyctl$chown(0x4, r5, r3, 0x0) 11:03:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) 11:03:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x1c243911) keyctl$chown(0x4, r1, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r1, 0xffffffffffffffff, r2) keyctl$get_security(0x11, r1, 0x0, 0x0) keyctl$search(0xa, r1, &(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, r0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r5) r6 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="97eb03b79c2c6c61f205f9de1f3094722cfa57187e23bd3d8eb4b45b5efde7dd1fe1c0e6f28437f88b974b47c4322a1770cd250f272521616a0208f37cf61e9ad3548ccc8d0de3b9b0516e955ed2764967bbf38e0ce5c3fcd4a315e33d65a3dd02d05922f5a6fb3d9751c5a52b2db3669bc858aa2c541a6364a4b3ca6e157aefd6cec8345d33453fd773fcc57d52d175fbb706cf6256e4d7b7c35c742753d2f3a452c812c25d6f9f7146b1224ced4983b3bd836ea507b30a2cf8b3b2d9966968adb623ebd2b8b3e04cfbedfcd9d53f8876d249d05ebe8fba23fdb043a41d1278a149e9740bd1aa0dbeee3f5d8655b95c2a9992e08ee679fefd10c7d3", 0xfc, r0) keyctl$chown(0x4, r6, r4, 0x0) 11:03:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) syz_open_dev$vcsn(&(0x7f00000000c0), 0x0, 0x200040) syz_mount_image$nfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x7, 0x5, &(0x7f0000000600)=[{&(0x7f0000000280)="278dfcadd400d1044a88067407832d34f26892246ec4a55ce0b3b63d910a9020ebb80d", 0x23, 0xffffffffffff8001}, {&(0x7f00000002c0)="869aae21e6c03d9c4d3ebe4e6448822f58cc4c1ce3f5f77336ce8e066ad89f6f8c453a95bf64a988cbc3cdfa3a22fd4ac7cda8daad6344cc80ac187a6692b1bcc5569d0a958ae81927eb806d9a76424051d081a8554adfe23197ddf00a4a8419a3eaf9099eb7056c44e49a4a5594a624e30d01866a0b1d6892140bbcb2cbd5adaee35497b5024c181f31a8fd46b77c71d124fd516311b7a73ee72809a994fb1b0a0845407bc13458e8c37d7f2e6d3541c7b4eccc49acd1cc34dc", 0xba, 0xf5}, {&(0x7f0000000380)="e6332c5cc8867e879c9cea718e7e7b76351aa73d361dc3ae6e7fd52c1b1347812c6f37ffc937d5ea13ac92978500627f631151ec996165220aee709494e8c291684eb00bc8faad3efe19dccd2f69f142705dedaa6e557b93800cdd3ec6c2686278d6f6ea4c60c86d5a22189750cbb0c722ff465620512ab5c80195ef991ae76539e3b5502b8d8a64432df1add0b95f28ea4bd35282717cd81ff519", 0x9b, 0x3f}, {&(0x7f0000000440)="b9749a2689cbea165caae2e6bdb4a122beab4b0990db49902ceba09ce3759d744dda2c421cc244d1bb5b00905d6055f39845b0ec8402c80114d3b933101b7cecf39aacd14fc44bc91974a94bc9215246d64aa9558271021852e798a81706e8764dbcc01aa00c7cb9ff86a52dbb80e5438bcffba05ff025774a857ad49d444c82b1e758a6f95daf7cc8a93863e9d64d781f3375e9305a5f0a46575b7b3e0742b4e97e999d9cb3f138b12c55598e169378f7f92b10f5b015014a7d7bf177168b6efe0ba80b8867", 0xc6, 0x9f}, {&(0x7f0000000540)="cbeb1e6413f560961f1b7e00a330b424b41ac5ad0a697e3f27fa2a3bd21d46eee0eed0d2bccc8610ac336a67800eab88709fc030ca3d677848087c51deab5d0a73fc8802a191626b59a2a2e578a5225d29ee81784544b2d99457f9947b4a46ba6af4faf3a7a8af73019612f90b26e7496e1a84c51e87fb440853e45562885afa5e1d8a", 0x83, 0x2}], 0x2000000, &(0x7f0000000680)={[{'\\*&'}, {'/dev/vcs#\x00'}, {}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@seclabel}, {@dont_measure}, {@fsmagic={'fsmagic', 0x3d, 0x80000001}}]}) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) dup2(r7, r7) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) dup2(r8, r8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r9}) ioctl$SIOCGETLINKNAME(r6, 0x89e0, &(0x7f0000000040)={0x0, 0x1}) [ 722.260629][T25732] loop3: detected capacity change from 0 to 262160 [ 722.272644][T25737] loop1: detected capacity change from 0 to 262160 [ 722.280676][T25739] loop5: detected capacity change from 0 to 262160 [ 722.301986][T25743] loop0: detected capacity change from 0 to 262160 11:03:39 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004d00) 11:03:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005d) 11:03:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004100) 11:03:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000015) [ 722.393426][T25752] loop1: detected capacity change from 0 to 262160 [ 722.393657][T25753] loop5: detected capacity change from 0 to 262160 [ 722.406508][T25755] loop3: detected capacity change from 0 to 262160 [ 722.431013][T25756] loop2: detected capacity change from 0 to 16256 11:03:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004200) 11:03:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005e) 11:03:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000016) [ 722.440491][T25756] nfs: Unknown parameter '\*&' [ 722.502647][T25765] loop5: detected capacity change from 0 to 262160 [ 722.517364][T25768] loop1: detected capacity change from 0 to 262160 [ 722.524343][T25767] loop3: detected capacity change from 0 to 262160 11:03:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000080000001) 11:03:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004300) 11:03:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000017) 11:03:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005f) 11:03:40 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x1c243911) keyctl$chown(0x4, r0, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r0, 0xffffffffffffffff, r1) keyctl$get_security(0x11, r0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r5) r6 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r2) keyctl$chown(0x4, r6, r4, 0x0) r7 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$invalidate(0x15, r7) 11:03:40 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005200) 11:03:40 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000000e0600050000000000000000070000040900020073697916000000000500010007000000"], 0x28}, 0x1, 0x0, 0x0, 0x8880}, 0x80) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) sendfile(r1, r1, 0x0, 0x8) r5 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000200)={0x0, "1da42f774f459ee3a09f29cc92cf30b71e1b17f3c48eb282250a0a8d0a66d18e8e60461493f9b8ca7cad0075ab7f40dd9398242d50988e6136a3fb05fd53ccfb", 0x2d}, 0x48, r0) keyctl$chown(0x4, r5, r2, r3) [ 723.253902][T25780] loop3: detected capacity change from 0 to 262160 [ 723.260912][T25783] loop1: detected capacity change from 0 to 262160 [ 723.268987][T25781] loop5: detected capacity change from 0 to 262160 11:03:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000018) 11:03:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004400) [ 723.292561][T25788] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=25788 comm=syz-executor.2 [ 723.320562][T25791] loop0: detected capacity change from 0 to 262160 11:03:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000060) [ 723.347213][T25788] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=25788 comm=syz-executor.2 [ 723.387088][T25797] loop5: detected capacity change from 0 to 262160 11:03:40 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000080)=@secondary) socket(0x10, 0x2, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r2 = dup2(r1, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0xc0182101, &(0x7f00000001c0)={r3}) write(0xffffffffffffffff, &(0x7f0000000200)="4a43de84420f647410c6e2b450e5cc3b644d48877e6cee66fe6dc552b1d25600efa1ea3a3edf70512fc100b2286ce3e89165714974921c41a90e187cc8462acb194eea5af3af57048f9a1a756bb2b267690f7f3e4ebc4ee02696eef107d14a50785871aa84d6d64642791005efca0c10b6fb008f000d0934d64a5da0e576f738205a04ca3adf75e72ce5633f2dfced26f16900dd527f2089d262b79326559c2f63", 0xa1) keyctl$chown(0x4, 0x0, 0xee00, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0xffff, 0xff, 0x3f, 0x9}, {0x3f, 0x6, 0x7, 0x7}, {0x1000, 0x2, 0x7, 0xffff}]}) keyctl$chown(0x4, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000002c0)={0x3, &(0x7f00000000c0)=[{0x3, 0x1, 0x9, 0x294da256}, {0x3, 0x2, 0x9d, 0xff}, {0x8000, 0x5, 0x7, 0x459e}]}) 11:03:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66610700000000000000008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x8100, 0x9) [ 723.393665][T25800] loop1: detected capacity change from 0 to 262160 [ 723.396498][T25801] loop3: detected capacity change from 0 to 262160 11:03:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000061) 11:03:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004500) 11:03:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000019) [ 723.453190][T25806] loop0: detected capacity change from 0 to 262160 [ 723.461712][T25806] FAT-fs (loop0): bogus number of reserved sectors [ 723.468304][T25806] FAT-fs (loop0): Can't find a valid FAT filesystem [ 723.531179][T25812] loop3: detected capacity change from 0 to 262160 [ 723.537905][T25814] loop5: detected capacity change from 0 to 262160 [ 723.545314][T25815] loop1: detected capacity change from 0 to 262160 [ 723.557436][T25806] loop0: detected capacity change from 0 to 262160 [ 723.574346][T25806] FAT-fs (loop0): bogus number of reserved sectors 11:03:40 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005700) 11:03:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001a) 11:03:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004600) 11:03:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000062) 11:03:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) open(&(0x7f00000000c0)='./bus\x00', 0x600000, 0x20) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x185b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) [ 723.580934][T25806] FAT-fs (loop0): Can't find a valid FAT filesystem [ 723.627637][T25823] loop0: detected capacity change from 0 to 262160 [ 723.641609][T25825] loop3: detected capacity change from 0 to 262160 [ 723.654266][T25830] loop1: detected capacity change from 0 to 262160 [ 723.655103][T25831] loop5: detected capacity change from 0 to 262160 11:03:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000063) 11:03:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = epoll_create1(0x80000) sendfile(r2, 0xffffffffffffffff, &(0x7f00000000c0)=0xe, 0x2) sendfile(r0, r1, 0x0, 0x80000001) [ 723.762189][T25837] loop1: detected capacity change from 0 to 262160 [ 723.770802][T25839] loop0: detected capacity change from 0 to 262160 [ 724.264622][ T24] kauditd_printk_skb: 10421 callbacks suppressed [ 724.264635][ T24] audit: type=1326 audit(1638788621.069:1083412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25803 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 724.295241][ T24] audit: type=1326 audit(1638788621.069:1083413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25803 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=33 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 724.319410][ T24] audit: type=1326 audit(1638788621.069:1083414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25803 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 724.343855][ T24] audit: type=1326 audit(1638788621.069:1083415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25803 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 724.368261][ T24] audit: type=1326 audit(1638788621.069:1083416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25803 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 724.392559][ T24] audit: type=1326 audit(1638788621.069:1083417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25803 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 724.417022][ T24] audit: type=1326 audit(1638788621.069:1083418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25803 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 724.441407][ T24] audit: type=1326 audit(1638788621.069:1083419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25803 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x0}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) 11:03:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001b) 11:03:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004700) 11:03:41 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000180)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="c022ef6197ceda29af639980358ee21666ded6a338acd0956c87186b34b76acd3950b9b6ab3140ac67eebc591844c60c7f0a99b340764dab8ece601743d4dcdd54108b447722e01366714f7cd7a96b064d42a80d4f1c0c341604a482f07813ffe80e140781dda71c261aef74e057dc1c9ffce408c8521de8d8341a64eb0a8e922ab647a62e4b8508bd275cf1e7c777f87573c85f14c00d8f0d9db1b3fa21775605ef9f941d317dd2fd7337d22cd6379c021e7442f856997b1d22637339ec233efa282f6eaa9d74d1f1d83033ec0f42fc20e4114ce729a2678e83aa119d4bd47113f3bdfa9dc1", 0xe6}], 0x1, &(0x7f0000000400)=[{0xd8, 0x107, 0x4, "3fe00eee9a589542b599cc6ea386e689be53767928fa498db69282492e9575d912ee72374a8b7515098b3be6b75e3fa4694f9d1ca867a981ffa3a29f068775e616726890c6cddcc5ff247dfbd87ae0d50da579325694f6254474ee09d132ae5aabb081195b81251a593d89ce27c3692b0c4fc5c6dcf95aab94c678711936705765ba56005dadec2c800dca89ddbaf028d06555ae22cc73000dfa32e2e6a877973714a009a711f5607a672f4920efd37d07b1ae24e296a467bbb304deeb59b6a325aa8d5265"}, {0x10, 0x111, 0x81}, {0xf0, 0x10f, 0x0, "72e9fc53318c631a08030c2f1ab5f82d462baed38adcf9e83717c659a71ec1c9857c9cc772a6cc44da971d1a892a494c4481482f541c4d98908743c7f91b19caf855fca7b8f19e1894e2620a672058261f35ec4f39aca19ae6292aa6f090654d1916d6ffe067f4cbb3da3dca0a5c22bf184d2471bbd51db4b8207eab3ea453eb5790946f6d523cad31d8eb006ea0c3ddd4caf32210f27a8babc9bf1ba64fe81fa03406990d64b9205b336411c5e04b3046aa69ef270296fa02684b694544c4d4d708e853a36847b2013df12c8a44e1d71036f733bc0e5af4b46f1861"}, {0xe0, 0x84, 0x8, "24bde33be63a275833c603c6fa6ebe240351aa788065d717737209d2fcc7c84789e9f9837825f1f5e0666e9d9f43fa5fd7e922c52a6821027c6f26bb9f76329e9d077844b4770ca23f39208b6b3b5c90d84a16d80b54ecb50181e847a0bc724d73e713adaaa73b32073c08f27d2c16628f12ea86ba923d542f9b224019fd9c20d6430175add5b78edb39be2d0a93f97e28bf43776a47f9b256b5b108c2e9b09ce40b4f11b6c060d871c18ede771e2dc0c8b5d52b2178b600220c0b6a40cd34ff64b2d5363ed425328aced7fe74"}], 0x2b8}, 0xc000) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socket$kcm(0x29, 0x2, 0x0) 11:03:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000064) 11:03:41 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005c00) [ 724.465700][ T24] audit: type=1326 audit(1638788621.069:1083420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25803 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 724.490138][ T24] audit: type=1326 audit(1638788621.079:1083421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25803 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000065) [ 724.529720][T25851] loop1: detected capacity change from 0 to 262160 [ 724.532919][T25848] loop5: detected capacity change from 0 to 262160 [ 724.548509][T25853] loop0: detected capacity change from 0 to 262160 [ 724.556851][T25856] loop3: detected capacity change from 0 to 262160 11:03:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004800) 11:03:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x1c243911) keyctl$get_security(0x11, 0x0, 0x0, 0x0) add_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r5, 0xee00, 0x0) getgroups(0x2, &(0x7f0000000040)=[0x0, 0xee00]) keyctl$chown(0x4, r5, 0xffffffffffffffff, r7) keyctl$get_security(0x11, r5, 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00050000000200000000", @ANYRESHEX=r10, @ANYBLOB=',\x00']) setgroups(0x6, &(0x7f00000001c0)=[r8, r7, r10, r3, r6, r7]) keyctl$search(0xa, r5, &(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x2}, r0) 11:03:41 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, 0x0, 0x2, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xffff}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000050}, 0x4) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 11:03:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001c) [ 724.653111][T25865] loop1: detected capacity change from 0 to 262160 [ 724.659900][T25866] FAT-fs (loop2): bogus number of reserved sectors [ 724.666587][T25866] FAT-fs (loop2): Can't find a valid FAT filesystem [ 724.692598][T25868] loop5: detected capacity change from 0 to 262160 11:03:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000080000001) 11:03:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000066) 11:03:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004900) [ 724.718461][T25874] loop0: detected capacity change from 0 to 262160 [ 724.743620][T25876] loop3: detected capacity change from 0 to 262160 [ 724.747610][T25878] loop2: detected capacity change from 0 to 262160 [ 724.752915][T25874] FAT-fs (loop0): Unrecognized mount option "D" or missing value 11:03:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001d) 11:03:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000000e0600050000000000000000070000040900020073697916000000000500010007000000"], 0x28}, 0x1, 0x0, 0x0, 0x8880}, 0x80) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) sendfile(r1, r1, 0x0, 0x8) r5 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000200)={0x0, "1da42f774f459ee3a09f29cc92cf30b71e1b17f3c48eb282250a0a8d0a66d18e8e60461493f9b8ca7cad0075ab7f40dd9398242d50988e6136a3fb05fd53ccfb", 0x2d}, 0x48, r0) keyctl$chown(0x4, r5, r2, r3) [ 724.821580][T25882] loop1: detected capacity change from 0 to 262160 [ 724.834938][T25885] loop5: detected capacity change from 0 to 262160 [ 724.858291][T25888] loop3: detected capacity change from 0 to 262160 11:03:41 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006100) 11:03:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004000) 11:03:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000067) 11:03:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004a00) [ 724.859077][T25889] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=25889 comm=syz-executor.2 11:03:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001e) [ 724.928236][T25896] loop2: detected capacity change from 0 to 262160 [ 724.972053][T25898] loop5: detected capacity change from 0 to 262160 [ 724.981794][T25900] loop1: detected capacity change from 0 to 262160 [ 725.000840][T25902] loop3: detected capacity change from 0 to 262160 [ 725.008378][T25874] loop0: detected capacity change from 0 to 262160 [ 725.021678][T25904] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 725.057844][T25874] FAT-fs (loop0): Unrecognized mount option "D" or missing value 11:03:41 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="eb3c8f000000732e666180f8010000000000ed6ee0a568fbdde4d9dfb7ff7986960002000000", 0x26}, {0x0, 0x0, 0x10000001000}], 0x1000800, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) 11:03:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80003d00) 11:03:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004b00) 11:03:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000068) 11:03:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000021) [ 725.088204][T25904] I/O error, dev loop0, sector 264 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 725.110312][T25911] loop2: detected capacity change from 0 to 262160 [ 725.112015][T25913] loop5: detected capacity change from 0 to 262160 [ 725.117273][T25912] loop1: detected capacity change from 0 to 262160 [ 725.130465][T25915] loop3: detected capacity change from 0 to 262160 11:03:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004c00) 11:03:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000069) [ 725.149000][T25917] loop0: detected capacity change from 0 to 262160 [ 725.164119][T25917] FAT-fs (loop0): Unrecognized mount option "À" or missing value 11:03:42 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006600) 11:03:42 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = socket(0x10, 0x2, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='keyring\x00', 0xfffffffffffffffb) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r2) r3 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)="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", 0xfc, 0xfffffffffffffffd) keyctl$chown(0x4, r3, r1, 0x0) 11:03:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000022) 11:03:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000038) [ 725.220522][T25923] loop5: detected capacity change from 0 to 262160 [ 725.227447][T25925] loop1: detected capacity change from 0 to 262160 [ 725.248704][T25929] loop3: detected capacity change from 0 to 262160 11:03:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006a) [ 725.278925][T25935] loop2: detected capacity change from 0 to 262160 11:03:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000023) 11:03:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004d00) 11:03:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001300) 11:03:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006b) [ 725.351503][T25939] loop1: detected capacity change from 0 to 262160 [ 725.360035][T25917] loop0: detected capacity change from 0 to 262160 [ 725.368268][T25917] FAT-fs (loop0): Unrecognized mount option "À" or missing value 11:03:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r1 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000001c0)={r2}) perf_event_open(0x0, 0x0, 0xfffffffffffffffe, r1, 0x3) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) 11:03:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004e00) [ 725.419139][T25945] loop5: detected capacity change from 0 to 262160 [ 725.419641][T25946] loop2: detected capacity change from 0 to 262160 [ 725.433523][T25948] loop3: detected capacity change from 0 to 262160 [ 725.438515][T25949] loop0: detected capacity change from 0 to 262160 [ 725.451515][T25951] loop1: detected capacity change from 0 to 262160 11:03:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b200) 11:03:42 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006b00) 11:03:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000024) 11:03:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006c) [ 725.520854][T25957] loop5: detected capacity change from 0 to 262160 [ 725.540258][T25959] loop2: detected capacity change from 0 to 262160 [ 725.560565][T25963] loop3: detected capacity change from 0 to 262160 11:03:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004f00) [ 725.561312][T25964] loop1: detected capacity change from 0 to 262160 11:03:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000025) 11:03:42 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000d01) 11:03:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006d) 11:03:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005000) [ 725.620410][T25970] loop5: detected capacity change from 0 to 262160 11:03:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006e) [ 725.682063][T25975] loop3: detected capacity change from 0 to 262160 [ 725.692723][T25977] loop1: detected capacity change from 0 to 262160 [ 725.717852][T25980] loop5: detected capacity change from 0 to 262160 [ 725.791392][T25985] loop1: detected capacity change from 0 to 262160 11:03:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r3 = dup2(r2, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0xc0182101, &(0x7f00000001c0)={r4}) ioctl$BTRFS_IOC_DEFRAG_RANGE(r3, 0x40309410, &(0x7f00000000c0)={0x6, 0xae, 0x0, 0x80000001, 0x3, [0x1be, 0x9, 0xd187, 0x7fff]}) 11:03:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000026) 11:03:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006f) 11:03:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005100) 11:03:43 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007000) 11:03:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000700) [ 726.491941][T25994] loop5: detected capacity change from 0 to 262160 [ 726.494042][T25997] loop2: detected capacity change from 0 to 262160 [ 726.504396][T25999] loop1: detected capacity change from 0 to 262160 [ 726.505455][T25998] loop3: detected capacity change from 0 to 262160 11:03:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005200) 11:03:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000070) 11:03:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000021) 11:03:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000027) [ 726.562810][T26003] loop0: detected capacity change from 0 to 262160 [ 726.621328][T26006] loop5: detected capacity change from 0 to 262160 [ 726.644119][T26008] loop2: detected capacity change from 0 to 262160 [ 726.652279][T26011] loop3: detected capacity change from 0 to 262160 [ 726.660507][T26012] loop1: detected capacity change from 0 to 262160 11:03:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005300) 11:03:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000028) [ 726.756069][T26019] loop3: detected capacity change from 0 to 262160 [ 726.759486][T26020] loop5: detected capacity change from 0 to 262160 11:03:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001e) 11:03:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000071) 11:03:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000029) 11:03:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005400) 11:03:44 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007500) [ 727.615605][T26028] loop2: detected capacity change from 0 to 262160 [ 727.620401][T26032] loop5: detected capacity change from 0 to 262160 [ 727.625456][T26031] loop3: detected capacity change from 0 to 262160 [ 727.637629][T26034] loop1: detected capacity change from 0 to 262160 11:03:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000072) [ 727.666924][T26036] loop0: detected capacity change from 0 to 262160 11:03:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="ff030000000000132e2f66696c653000"]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005300) 11:03:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002a) 11:03:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005500) [ 727.753336][T26044] loop1: detected capacity change from 0 to 262160 [ 727.754716][T26045] loop0: detected capacity change from 0 to 262160 [ 727.780801][T26047] loop2: detected capacity change from 0 to 262160 [ 727.792093][T26050] loop3: detected capacity change from 0 to 262160 11:03:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002b) [ 727.792496][T26051] loop5: detected capacity change from 0 to 262160 11:03:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000073) 11:03:44 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000801) 11:03:44 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f00000000c0)='./bus/file0\x00') r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) statx(r2, &(0x7f00000017c0)='./bus\x00', 0x800, 0x7ff, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat$incfs(r3, &(0x7f0000003c00)='.pending_reads\x00', 0x120, 0x19) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) dup2(r7, r7) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000003c40)={{0x1, 0x1, 0x18, r0, {r3}}, './bus\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000003c80)={{0x1, 0x1, 0x18, r2}, './bus\x00'}) pipe2(&(0x7f0000003e00)={0xffffffffffffffff}, 0x80000) r11 = fcntl$getown(r2, 0x9) r12 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000003e40)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r13 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r14 = dup2(r13, r13) r15 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000003e80), 0x0, 0x0) r16 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000004200), 0x321400, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000045c0)=[{{&(0x7f0000000180)=@file={0x2, './file0/file0\x00'}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000300)="d423f584ad1a3894ab41b83c659082255a8bcaef3eed54969dbb3347f076f11b1190f80edf2565f6fe2dbf41fe9dee6c1626ff8c72605ffd530209c946ff1c2230e1f49aa9a1d32276aac7d2b47a01a54b8dbdf82d943eafd1b2d9f1b17d03b81ae83f484934809d9daf60083c2b2fe69ed7c1fd7572ae", 0x77}, {&(0x7f0000000200)="170d3b", 0x3}, {&(0x7f0000000380)="1f445df9401b0e4d0f4ee2361e849130e5b0dc4cbcb0c1b64db1cae13cc87d6f92bc44540c4ebc350b0687c8a89b30d7ba9a66d0d718a4be6fef1334566419e6e05eabe9ba0d82bc7307c7f27fbcdbbd06f3d1fa5d33581b63b95fc8a518262f93ddb23c080b4eaf86f4dc46a1aaa877c1c8908792c88279b0ce52c90e8a9c2754e3fcbfe1f4904a4fb8f8d98b71e92c6acca1f467bd3e519e0704fbf73e40fac9efa43d91a3be066185593928348b3d0b505eb6a1c95b347924991270696bd717e482c0d1a5fa1d8836e426a1184154b872d5f1c3ebd09ecc3dc0962ac72d9c59d9ff6800ef", 0xe6}, {&(0x7f0000000480)="626f3c18ab7749d8cef6f786214917d6ec85782038971fd539798471bd20385d8464db72b21c16605faebb64c5bc67d88e0ae7dc012a101b0fb3769559f5eb3a1c86823c2f7793aa93e6336dff40ebdae8395f051878dc89af0fa3def409ba7a2e250f87a4dc8ed2a90e0db4cbe4db78bd0524a2c1a70f7d90c4acd6818e1b0865eebc29cf4bc99e6b23a5f62875ac7553ed16", 0x93}, {&(0x7f0000000280)="dea58725f2bd4cad2f7c62235305ec38157341d7c268a761c5522df55f45f44582f2c987caa3134244a84140e41024e06a3ba48a7f41335166bc1e0dbe", 0x3d}, {&(0x7f0000000540)="ada683cf00c3d449e7e52044ad1bd2908a03279c65a95c76e85a1186430ee9901578adf6820cfc7f7cdf85792626acec882823c93e5655854349c6a960b30ac688d9d1dcd61cec184744952e83160ea5ae46d5c6ebe5d1ba743a664e", 0x5c}, {&(0x7f00000005c0)="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", 0x1000}], 0x7, &(0x7f0000001640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r5}}}], 0x90, 0x800}}, {{&(0x7f00000019c0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000003bc0)=[{&(0x7f0000001a40)="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", 0x1000}, {&(0x7f0000002a40)="01ba709647e554ec28accf1aba604bf24c00aa62483eaccb1ac4e9a80e2bdfce07b7692cd2c79da5e94f022495d4b79fa69e8f44cb9f103efdec019847c8b26a7d97ad6f5549e1896f443be074953c8f6630435802311369d4aa53b3bb77a723d5f8dfced6c9a342ff241e1c88ac42165135472d5e3c6c5d6f0861069a0935b1c56b23f093c2acead8de4a4b630876fd4e54dec9ec874d02b91a7446b3fc16aaf81ef306b5ccc5a154457aeece7ba5ba09252083c3ad77cc8b49ddd6b67fc0ead8454525771618856a229108138daf", 0xcf}, {&(0x7f0000002b40)="76298825eb5a2537a2304f3532506cb0cd8cb15a183e0697f54fcdd7905c4d5a83aadb4a17cc05bd5d12fa65c898077dfef8ace1478fbb85a15febcef6f0d1c77febf388c4621462c78053d8d0ac2a1b468c2e28903e58b9f7988e9d455d5bb9c5692ac62deed663a8a86a48", 0x6c}, {&(0x7f0000002bc0)="eec90c6c5e1c2ad71e579c58a85f997601e5514ae6513e750afe48c0fb8c65e9940f3c71aa7a3edd441b2136e0961c3f728542767194c8e299678ea9807c103e5ff5559cd826728616cf69862916d6f01d89e22e521c71d6336ad728addd6c27fec8b9d773fb4c57454e03658c60607a7e7a2e9735c923f1a56cd50dc3b5d53fda84f30f3438451895bfd4eba5e188e5cbaf9eab6b0ed235768d19d41a1ea0e43327bf66421bc541e13700b8e51204e547341e1cbf8b11158b446de623e7f7754690b36c0c978c8d24f68615bc41c8a13ca61cd449b8236dd97ff5fdcfb9ae7723e8537f8534226427b274c14cf1a3dc81a9121000d73f6317eca15d0e24176b441970c9d1ce30a5ba47ac59498335270600c3690dc2a616cc801e1ce4776153e7972c369ed27aeb4524b9a80bedd96693f6577b1e769502c7ec294c16af9dd3a89f580913177e18e4befd63601f23afcda3c0f5ac17235e87ae17313894946d9d8cde2b10db8bb51213df6c653c439c6a56caebeaddcff6aaf90a7b0db035585a4d50f83a77c84810c1f4814fda060b8607e3307c91a84d799b59dd2156a7f409bc42615756e7b080c2f0224a176cf4c3fd1347b344d5dfb627ebfccf8f0b22d84de9ebe261df56907a12e98cdef01d96ca5461e4d922d56bfaac06d5a61a0de7621e33ecce2345ffe19383ad107b1bee4c70796adf5959065801aaf49d5e54a90d5a6c293fded65966ba79ed6a7271efeef5bbe19ed3ee02cc421122e18ab226ffada4b09c7d2bb82b6bed13d54929d2d28bb5fb00e6dcb3c5779179b817f4ac20247f0c5cce4efa607ac692730b569912c91e3702ede1c08d2946d6fdab1179d9101f11d7ee41b62306bf91d10a9653eed7c47d4f5196b45ad4daf9ca25d8aba7c8756529bb1311cc30eb1129f0a8dd9dc3c18c035962b09f6a75fe60196601dca3bc56ee18be1de32282f4f747c47debeb947ec92c1a1a57ea9effb63e6bbc7dd48742009c1b2db98d775c2f0a899c07e51eb5065384c36587d69e621dcba289da889a29f1b7953fe651e75e8ce6bd850d8a42be049ad318b5ada14df4af43aeb2b2952f203b910610e7bdf883a688c8291af83a54691ac74dde60e4dfb802a35b02526d2bf8e489e1fe53eb83c75942d3f65dd40956abae293ba7c24d6c11265110e91d640e8e2887c4831c94989ebe3125574bc0e63a9cbd89eba9df50700adb9bed67a8a7296de772c90b24b1113d421de1b8edbbc2d53feb37f324f22d80257697f73a96bb6d03dfc7d230b9ce0322e6ebfa2c82003b19469aaefc984735a7d7d80a1b3e21ad02cb952110e609c1d150d37a4d9f6d34155a168965e4515c17fb700a7f3e2efac44fdb4353a9c18668bf6412f6461437359a28928765d7ecff1f967e4e6345b7e7d7b1a56da4d285b9561a43776b53ef1d08a88e5395a2ffe765e0296e845cc43a00c40e41b7ac57f566f76a0ed7627c03df77c81a5bf472b40c7cd791e4e32db1dabc5102768357043fdb754396f3918fb7a56ef86b2a7876c0c4811a08373e32d64b22de3bb9829fbcef43766b6690d27b62e1713ea6f92b5a6435211a4df515aaf45e1bce3e66c5bd39c156aa736b7e095454be4bb0bee2f3ba5fe4a6e62ec253c1801df7c4b83520767ed4ed5c33ff7d97dec7ddd9f3832e43ba4926e37b02abb9a60595aa1154dedac5ecdccc4af3d8c8403289c01ae1e227c1bc04c374f3a72c211fb9d32921944ac1a0339902d4bd1a011bff508afccde81f260813442346c3183a65029aad8c22f0e0fe02b02de538ca0b6f80764210453201954e75711200ef53d0818d94652e0d4389dc466239b70279fe3481df386693853c90f0f45f0f8152b663d9916912cf5b554a6b03503cda1ca4ff5ee09f68cd2cd8d6d9e376163254b6f13802b87fc91bed21edebd32440d221ea6b3534ec107e087277778f74e588f906cf132395b99f3ce29ad3768fd3171e719968182a64b93a34556ad2f4d81b188e84b43fc8c4b58f55106969150fec2f1d16c91f3edb8c6315e3f8829a2c77659c0a19da7904a083c3a004ed5498f6769f86ac4246826d1649b3bcbce4edf144c60338c39b147c7ed903602b9a51134d39f89fb88c84585ba19ce29c904bbaea037271e8c814a226432c8abdf5c0b1829ba97286973e2e01ac057cc20648b1153052c6158a92d26fca63d0889b65d4a42d9889046fad4c7283a0963d7c0aac3b859c40434a5dda9974c68b1cf196e729a363f827e76033a10c3242b5f5aa7fef29b9b4fae2e0397fc7f4e28b0569c8f7b5d89de3e1ee4d77b15bedb0e266f87e79dfd22c9efbe8e1847557ee588e417c6bbbdb90fb269e8369937590c791499a7576d9448d6efbaccbc30d1040ed434690044579c0e2cdedce87e7b58cf34ba5b1bcd3b963b547f3f4e85f5a640b6a1d5ec8657e109b1fed79d84bf84b706735dc6543e5039c2de182c8bd1010a338a203a8f7f2227fbb63ac9b5622abb849d8066f1915366072b48ea0197a7b572894de86a1b5a2113b86a245d74463fb565b93f0884c4c831bfa4c9fde440239d2712f1234edd7479695e3be0afcaaba1ea7cd4e2dd3c60fe1e575585eb13f980afcc6816a29637066edde970d4f352cfceac451ef1b17c85f35523a177b7f011900656bc9f92de47588f53906e27b583a4a85493dccf025772abe1495a4b25b642dff581838c0233878d278d56670aa45a455fc24ee60577be8ee6de4b16be33649f855164112b946d286af3a234295a3347e93bcc442dcd0eedaba5b0cf65e153511e6f1bfcae2bdb96a6b78d33fec0471ed72ecfa38afd701884c4fdbcc638ed8cf457d6e4abdd66136ec9ab1e82cbbc727b7e8bfb7d70f107416056b3198e866efcf8e57f1c3c488988622b4a6f2bdc59ff7611aba4295ff26a7332bdc5a71f5e24032ceceb99a64ae085cc232f47d987468d5d00253c56f9943e9a54ebe0858a06c07b9581e6b828157f5eefcfa820d6f3769333d0697a9196955020fe6af979336d7875a46ca0b3acefc1ec331164a522b81548b00533febc5c2a1474ffc68e20e4ead7a3c97fbca555212af5f97e9ca409c63959abdac3f5d95c7fd58d4e8074e240b4e93f8881b3122d95bead25f02ad50f8224b390ec6683a3f8d0b8d590d1c769db29053824ac86a3d72eedd8e15e3138fbbb2c4412fc15ad0618068702cc903e720d6324095fddc166d16fd034fa88a0adc466aa22543fddb9f2c724ccb6c31a9a284c5dd985ccb915e7c3e9923c288f20c38b6b870f7e086bf100f1c8d047671b5d9300ed872a07f9c438f4e5b2626366afc9a1c2d6b196d666b9781416c5bf74fbeb7720bef66945e97960ec7b9823e19cad3f9229bd17046258e609310ec0b45798c3aeff0adb9fe654243871c83230a754116aa1813fe5895a2465c8719589b229536fdf6c26d5c66f7cab60fe214bc5b220c54290691abba5c5d6a3469ffd4fb889c434caccaf4f9429839f7693cd4adc94ac232aca2da74eb38cbcca67ddc97d32f47cc4ab697c75512a34be867c32aba1296e06c1d99d61bdce62d1cd3b3f32b96b90428cb7ba725bd6d50b7633e9cbf21ad79af47faa360f65965e99cc42318f152606740714361f1df8731748573729f97f368c1ef73b14f80148252d4c9f22123e8ca2073c482fd8f79feae208cdab95b274e6ce22a1c5e94d89470f3415ed109c71d02992132bf392a2c12cf5ecf2c88105a972c46fe85dd56117402de526b80454f786203eb2d58f42ba64edb78b3e1231c8913705b2483baea52dda4daef1f07db45f3d62e17ae32571cac61922f7ae69c112b64be9737bec93a3327dea4644917038b2dc7cb95d468a7066ca5a105994fbcb1a391d6cf117ec4829eb80319bf5170d3f1be3e644d21327d2fd7bff40a6d9205942f3821f1f863a45a258567e8f21c7c30bfe51c8290b26e719f6af44ecb25234f8f2c0b915c05f63725da53d0530a32cd0363a3a95e0ce7fd31de5a8ca0f44bfe9c6e0d5525e304d9f5bc670130dab0cc02c63394a43d05980a21e37eb92ba0db34aec692611f8553cd70b6383dbc83e02d6c061fe271b75ee4831506a3bd2f0c6dfd2b6ad3ce96943c678854a2b9146ae0214866481eadb996c36261cb0f8872207832cf66e1807fea502681a3b8cda3bfb64aa9f0554e78c1075b387441b08a5770830929a7da63d49d1ee07afba8c2738651bafde2050621013f35b95e281a8e5bdc81e0ad2092a69592b2524d22f3e618f252358939c3b4631c2cbda90675371bc67da5bd551366d4b6b777caf9fc5fe6470305b4bfc6677aae6d799ed6d88e2a1a868265adf60de3b6a119bf1f65e8c92475ce30b3bf82e80dff722d7f1e05cf2f4a273aa3bb2c79aaa54338bba01140b9f6bde80dbfeb8b9cd41ecab1cba9e8f450675831302fc4260b4934d3c599a2ff7df59fbc44747be96580375fe3d787d1f0bba795cf4f36e47c46140090fd4c855dde59410934d35af016912dc6ba6136cab91ce79fdabaac2c813ed30a70aff1307d876d5b38457774ee86e3e901538fdf1ae497ac49cacf783b0e63e349909aaf1bf905a9905dae7978a742a64851dc622effc05871a2468fad1c611348e65008282f88994687b9af3b66bd7e186ad3dda4132e13b3d36af771b180348de54d1e99511fe742e0bb52c9a22fb89497a5113e39dc9d6acbc3c67005cb9da423ff822d88d15398127d055dca63b03bb7daa33950ce6cc39ba75f70461e3d5d691c517da56a7a7a2183183748ccebd83331b1596142334552738ff09bfb71b1c66a8502d5c9d19a2313f2316c8462f2a5345c83ecd7e11fc84c3c70b20563467a302ffca3a5c6ada9c3847092139dff0ba2aa41e33237c59cd58bcbc65e2f8dedf5db08beb5f2c1be386558221a07b93641525003da3bcbef7db5307167105508727251d1427c305ed172356a1ad0e075fb6d7eb28e411018b250338c1122c890b72480dcb8571bd303129e368f818c7ab6b6e9a8ae73ea6c085d6809097d356314c332f28bef1b0e0cdf39223cd7a411ee77c574b5f38461c1364e7164a23ee551a2f3433ffe9eaa017d24992059f981a5df304e1a77e92ac4cf5380bd4ac92e09102d731483cfe0c7650876bc565823e7c20ed2b9d04f30d9fae231452cd2203737661828aaaef3c0ed2dc673899ccb4cedeab0ccd6b451c42cb250d26c2c171a028d37ac59ca2dc8be6aefd10a3276c5586aa05ed140584f06bc2c3225ddb8015f924fa21ec26270f4557d920718813d5d3339eee4b7e7c9819a2be8b3aab8b437f20c484fb7b455fded90553e9827f92e19e6a192b315db188736fa181d66d2d9c7c0bbc2156b09c8e26052cc84ff5a7041687b9311c80084517241ff317eab333d5703e7b862e1f7e34bf20bd0c4432fa7ca9fd5baea8747ed9c0585683fc10a70ca1d455133da39dd9018adf31b4880a2b49bb0a0e53aaf9986ad68404989ce0eb9e861fea2da003611fed5b49c0bad235b87c7563ad7391689aa493ba64181132db9fcb10b83a39d11e9dac37731757043b6937671ba30f3f96418ad9b4e7a75bb0364e9325722f615010d2306bb54525ca370f4718c3805892d2e734fc742fed41bd9f3c371864f89170b580f6a5ac1d582e87136f2608f50ee43ce82074033fc0a8907cadafbed1e8edb59de153824c9ee671703f1c5b0f2f39cb9c957f5d1bead4f3c76994baa9bd3f923c01014bdf9f7805eeaf7d58f4090dfb979da632ff65b3d51492d58a76b79fb3573", 0x1000}], 0x4, &(0x7f0000003cc0)=[@rights={{0x34, 0x1, 0x1, [r6, r3, 0xffffffffffffffff, r7, r0, r8, r0, r9, 0xffffffffffffffff]}}], 0x38, 0x20000000}}, {{&(0x7f0000003d00)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000003d80)="b5d6e451258ea4bad0426de60a1007037a665d6894d63ca6d41e0d68205c84b23f6d4e", 0x23}], 0x1, &(0x7f0000001740)=[@rights={{0x18, 0x1, 0x1, [r3, r10]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4}}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00}}}, @rights={{0x24, 0x1, 0x1, [r3, r12, r14, r15, r16]}}], 0x80, 0x20000000}}, {{&(0x7f00000042c0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000004540)=[{&(0x7f0000004340)="bd04f54692b687cfd56f0379b7", 0xd}, {&(0x7f0000004380)="014d8f157fa4bca44a1655506f6fb441975f885bc1617f1e10eaec453f24e0f0c7131e1d14cdebe94c5c5ce52310473085c85aba9ad9e87b8eaf927e5bebfde8d77c9c7777b18f2d2d5c11dd84e19507a765bd11da5a61df1abb75bccae7e8356dda58683877fcbe6ad3ffb476d70928860a70518de78e8f15984086a73ab9809524ae8a176cd43294b91519cd6045a897dd2606cd6daadae2c3005f2859c3b35523f1db12e6921e03271803a552fe92f5338f313a2e9be8b110bbe5d87514c5d23aad0b5b6a0dfb60ca97fa6774a3a26a7f288e7da1af0e5031b45253015d1e09bb75a5f0233f02da19207a3672bb735b296bd1", 0xf4}, {&(0x7f0000004480)="b22e0761cc61fe73ddedab96115d26689aed3dfb550007cb740ee6a2c34f0c9d461281465f7104ff432985", 0x2b}, {&(0x7f00000044c0)="226f614dbccf64bf32ec88e097e2cd5ed6c480877f90002382fa626f88aebdbac4442940ed884908aebfec8fe8429be8ae021ae8664cba26d6a924a4e6ccb6aead83b33d1f1dd4b35b8dd59c7514", 0x4e}], 0x4, &(0x7f0000004580)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r2, r1, r0]}}], 0x20, 0x40008001}}], 0x4, 0x8000) sendfile(r2, r3, 0x0, 0x80000001) 11:03:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005600) 11:03:44 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007700) [ 727.902797][T26059] loop0: detected capacity change from 0 to 262160 [ 727.911360][T26062] loop1: detected capacity change from 0 to 262160 [ 727.912227][T26058] loop3: detected capacity change from 0 to 262160 [ 727.933926][T26066] loop5: detected capacity change from 0 to 262160 11:03:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002c) 11:03:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000074) 11:03:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005700) 11:03:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002d) [ 728.029939][T26073] loop3: detected capacity change from 0 to 262160 [ 728.045990][T26076] loop1: detected capacity change from 0 to 262160 [ 728.060513][T26078] loop5: detected capacity change from 0 to 262160 11:03:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005800) 11:03:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000075) 11:03:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a200) [ 728.161288][T26084] loop3: detected capacity change from 0 to 262160 [ 728.174114][T26087] loop1: detected capacity change from 0 to 262160 [ 728.179177][T26089] loop2: detected capacity change from 0 to 262160 [ 728.181255][T26090] loop5: detected capacity change from 0 to 262160 11:03:45 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'team_slave_1\x00'}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0xee00, r3) r4 = add_key$user(&(0x7f00000013c0), &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440)="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", 0xfc, r0) keyctl$chown(0x4, r4, r2, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r7}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000002bc0)={'ip6gre0\x00', &(0x7f0000002b40)={'syztnl1\x00', 0x0, 0x2f, 0x3f, 0xff, 0xa07, 0x0, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7, 0x8, 0x10001, 0xac24}}) sendmmsg$inet(r6, &(0x7f0000002d80)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0x20}}, {{&(0x7f0000000180)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002f80)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="72af547546d646b5bc913090050d325d05f81f384a4ea3938e179a56780dd0a5332f74806a88424646c3fd7955ac238df54bb0bf883dffd586ca5c386d1045cb81b2fac8e56d58c27087030fb32c20b87d57cc64b577dbd1ae3723cddb0f6034276da6645020223113fd8eeabc9336b889a2daa3b3977dfb07dfe4bc4995371c0f0d11c7a28c07487534887aacc4e5a3f67a86f0e6af03cae5c825d3a780fb210b943d4956d1306344d6257e2b8556f46aa8b3f1951d9aafb845a6e2b65ef364", 0xc0}, {&(0x7f0000002e40)="e204b1eb9315201ccdd9062af0de3cee2caf663e51cc53e66c79a234487e547d3e5253938f4ca47a57cb06d9af7267eb675488be7ec27006171f4d7873277390e87c23f3ffc549b191d2965f6a074216d78908023b886aa9e562f513c46790391d16801085d8f6", 0x67}, {&(0x7f0000002ec0)="aec313dd2fda1027d67a8990bbda16f6fc39230d47639b6cdaf74e15447345c96615763677405942d6ad54218826589aa3c99ffacf79a42895f1991692f44d710ad827fe778896ee72b4b849680ed6d5883efde51d77c8b61e7876a0df7ddbdd3521e68983041e23582fcd68fae3d0b263e7e5e714c1f3be28a8d50eb799810ffa5f817598b2f5b765105770701d6625c41b79ba5d85efb31e07c685ba946ab7254e541d83e9959c0b268ef5", 0xac}, {&(0x7f0000000100)="d4e1a5f7", 0x4}], 0x5}}, {{&(0x7f00000012c0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000002a80)=[{&(0x7f0000001300)="ba742098ad721129fe9b391297559575623a7dface1626b7a8b3722bb8", 0x1d}, {&(0x7f0000001540)="7ee7c05f9cc965c00ebfc39ab767e0512360fc39f30aefe39eb815ecf1581193ea18121c31023fea0217a89ae7bdf37a9446740a205f36fa4570fec44a682aaeab37abb3c5b5db2d396e70a049583cc152503afb00c87cedd52136179e52ccc21dc44d54412e501709753fb1b1a867190b85dcd64f1d5c78209a79c813a224185224b1e6b15c35fc8eb4dbfec89daaa81dfe8cc24f6257632b08ca20152116d0bb3cda9a5c7c613483156937807d6919edea0e61526c8fc4b5f7af755136e84a7b9785cae264dbe544a81165bcce519a3824ec6034179ab3c45c", 0xda}, {&(0x7f0000001340)="21d495c7c0eb2327a7bbeb03f359cfdf76583c5bbef774ed81f5adae132e2f1a247ff6b566b4b1938e77f2a0e7b157dda01b59902903665686b0c6197e0ba7a0763dcb3db991b033f559ac132b49bdb3826313a0ecfabcfa1e53bdba9b4249190fc578edb5ce030e7ae57dda5c441a0b83781b01", 0x74}, {&(0x7f0000001640)="489c386d960b77615a600a05f35adf3d03908bf05e908872395fc47b16930b249af7ebe147997a4ce30fae5f3843cf2a79e3ab731377138699b8d5548cd38f3a29f7a2f9fa070988215693f659dc87c9c225e821c06476da65e0a2c8cb83", 0x5e}, {&(0x7f00000016c0)="1fede83892c8965838fac0e652a0863d241ac6e882d2bfd5855d55f0e0e8a6ed1478d9732e65a59c7558f474dcd883dd301e799881a5d5c49130e1a78f62782a701def737ea01eb5826cd3c34ba4a777b866bed282bbaf2a3b301334ffbd86e2f6d24d181e1237add10ac30c82be2000053ff66cfc346a9b0565f242e62a48eabfeeb70415fa54c7d1a01d87c184a82f0c475259f3aed99eaf8428b36bb09d1934318e314d87fc77ff5df703c1340727ad5c462c5aa52fc83bb12e66ef93d248f3732aa8737d79cb4af2af9329b03c26dae1edf9f0346109d78942a6ad4df08ab0ddf1e3123b5eefc467818c388654ef0425", 0xf2}, {&(0x7f00000017c0)="a853e05e17e64694d888913e12be43f77c152d31a3c08d18d763754237f65d77447a3fbf520546c228f0a4999c3b61614be561fa9eb07aa2c799022211068d4e2c2d43471e75f3009e27e635934a8162a1baf6db61ec1e8129bff58ba4a005ddb6209b1e9c5abed2acf7", 0x6a}, {&(0x7f0000001840)="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", 0x1000}, {&(0x7f0000002840)="27cf908f9fbe83efdf3300721703b7d855aaa168dd2f6bcf35c380df5d0921026ae1ae94fc67780c10b876e091402660efbd1718a558c97219930d93a67ef13ce482517c9db65a334ec9fd9a48183a2b8c94960919fc5d5e58231594aa3ab407b65c78c5bc967696b82dd9c8230ea7e0097bd74b72f7c867b870508b2eb4ce4629f9da81507574a8985f4723ba", 0x8d}, {&(0x7f0000002900)="1b20c03b4fef42a049cdafb0761715c954d816fcabbfaf8d3877ca14f4dc435d222e550da8094c55ffb8b3f3db39021933f0843ec5338109b359fe06b3af23183d5d7ae3e82c429797ec4c946fc5462e1e338fb8012a7be96253", 0x5a}, {&(0x7f0000002980)="d825b697adf048c7746460d0c476808368b2fff2e2abcf0f8ab7d24ab7ae47ec3a572a73108a6d16b77c139fee8a17a3f7b775fe16cd8af447efff4a6fde6a6ba11b2f0eca4329f0961a30ff46135069e59e69b2ff694204b0113a520adca97a72588d7f7d9cc42ebae2d4ba7f51afda6baa5f5dabdd1c1e50054277aa159f167f05f83efb7d042fea7702e6644c354d1cebe9ceb824208cf5b6a73fef204c8e8b017c56309fb5e757a42b1df161b39cee08e790ae425381b2231fe6f8a05f4d89c7caaba04a8b9d16d6d4", 0xcb}], 0xa, &(0x7f0000002c00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x43}}, @ip_retopts={{0x88, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x44, 0xa1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@rand_addr=0x64010102, 0x6}, {@loopback, 0x3}, {@multicast2, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1f80000}, {@multicast1, 0x3}, {@remote}, {@multicast1, 0x401}]}, @timestamp={0x44, 0xc, 0x76, 0x0, 0x6, [0x0, 0x1ff]}, @cipso={0x86, 0x27, 0x1, [{0x0, 0x9, "07bbf268b29243"}, {0x1, 0x7, "203a06f88a"}, {0x7, 0xe, "8f796ba7f687ba5c45dd7573"}, {0x1, 0x3, 'V'}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @dev={0xac, 0x14, 0x14, 0x2f}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x168}}], 0x3, 0x44000) [ 729.274544][ T24] kauditd_printk_skb: 13695 callbacks suppressed [ 729.274559][ T24] audit: type=1326 audit(1638788626.079:1097118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 729.305155][ T24] audit: type=1326 audit(1638788626.079:1097119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 729.329480][ T24] audit: type=1326 audit(1638788626.079:1097120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 729.353764][ T24] audit: type=1326 audit(1638788626.089:1097121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 729.377995][ T24] audit: type=1326 audit(1638788626.089:1097122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 729.402599][ T24] audit: type=1326 audit(1638788626.089:1097123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 729.427083][ T24] audit: type=1326 audit(1638788626.089:1097124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 11:03:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x400, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e6661addd020101000240008080f801", 0x17, 0x2000000}, {0x0, 0x0, 0x10000000ffc}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x208001, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) 11:03:46 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007a00) 11:03:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002e) 11:03:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000076) 11:03:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005900) 11:03:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008f00) [ 729.451426][ T24] audit: type=1326 audit(1638788626.089:1097125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 729.475747][ T24] audit: type=1326 audit(1638788626.089:1097126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 729.500102][ T24] audit: type=1326 audit(1638788626.089:1097127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26057 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 729.537490][T26102] loop3: detected capacity change from 0 to 262160 [ 729.541009][T26104] loop1: detected capacity change from 0 to 262160 [ 729.549188][T26105] loop2: detected capacity change from 0 to 262160 [ 729.554347][T26107] loop5: detected capacity change from 0 to 262160 11:03:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002f) 11:03:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005a00) 11:03:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000077) 11:03:46 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) (fail_nth: 1) [ 729.607015][T26111] loop0: detected capacity change from 0 to 262159 [ 729.636392][T26111] FAT-fs (loop0): bogus number of reserved sectors [ 729.642994][T26111] FAT-fs (loop0): Can't find a valid FAT filesystem [ 729.677809][T26111] loop0: detected capacity change from 0 to 262159 [ 729.691300][T26115] loop5: detected capacity change from 0 to 262160 [ 729.691777][T26119] loop3: detected capacity change from 0 to 262160 [ 729.701562][T26120] FAULT_INJECTION: forcing a failure. [ 729.701562][T26120] name failslab, interval 1, probability 0, space 0, times 0 [ 729.705781][T26121] loop1: detected capacity change from 0 to 262160 [ 729.717140][T26120] CPU: 0 PID: 26120 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 729.732348][T26111] FAT-fs (loop0): bogus number of reserved sectors [ 729.732495][T26120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.739040][T26111] FAT-fs (loop0): Can't find a valid FAT filesystem [ 729.749048][T26120] Call Trace: [ 729.749061][T26120] [ 729.761834][T26120] dump_stack_lvl+0xd6/0x122 [ 729.766434][T26120] dump_stack+0x11/0x1b [ 729.770591][T26120] should_fail+0x23c/0x250 11:03:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000078) 11:03:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005b00) [ 729.775007][T26120] ? sock_common_setsockopt+0x5d/0x70 [ 729.780388][T26120] __should_failslab+0x81/0x90 [ 729.785233][T26120] should_failslab+0x5/0x20 [ 729.789741][T26120] __kmalloc_track_caller+0x6d/0x370 [ 729.795070][T26120] sctp_setsockopt+0x8e/0x8870 [ 729.800018][T26120] sock_common_setsockopt+0x5d/0x70 [ 729.805231][T26120] ? sock_common_recvmsg+0xe0/0xe0 [ 729.810371][T26120] __sys_setsockopt+0x209/0x2a0 [ 729.815324][T26120] __x64_sys_setsockopt+0x62/0x70 [ 729.820469][T26120] do_syscall_64+0x44/0xd0 [ 729.824897][T26120] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.830802][T26120] RIP: 0033:0x7f0891846ae9 [ 729.835205][T26120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.854797][T26120] RSP: 002b:00007f0890fbd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 729.863279][T26120] RAX: ffffffffffffffda RBX: 00007f0891959f60 RCX: 00007f0891846ae9 [ 729.871238][T26120] RDX: 0000000000000001 RSI: 0000000000000084 RDI: 0000000000000003 [ 729.879264][T26120] RBP: 00007f0890fbd1d0 R08: 0000000000000014 R09: 0000000000000000 [ 729.887216][T26120] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 729.895261][T26120] R13: 00007ffc82ad702f R14: 00007f0890fbd300 R15: 0000000000022000 [ 729.903392][T26120] 11:03:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000030) [ 729.970475][T26128] loop5: detected capacity change from 0 to 262160 [ 729.979093][T26130] loop1: detected capacity change from 0 to 262160 11:03:46 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007c00) 11:03:46 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) (fail_nth: 2) 11:03:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r1 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000001c0)={r2}) statx(r1, &(0x7f0000000180)='./file1\x00', 0x0, 0x28, &(0x7f0000000300)) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x4e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) 11:03:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005c00) 11:03:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000079) 11:03:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000031) [ 730.015638][T26134] loop3: detected capacity change from 0 to 262160 [ 730.062894][T26139] loop0: detected capacity change from 0 to 262160 [ 730.062995][T26140] FAULT_INJECTION: forcing a failure. [ 730.062995][T26140] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 730.082633][T26140] CPU: 1 PID: 26140 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 730.091397][T26140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.101442][T26140] Call Trace: [ 730.104712][T26140] [ 730.107689][T26140] dump_stack_lvl+0xd6/0x122 [ 730.112273][T26140] dump_stack+0x11/0x1b [ 730.116438][T26140] should_fail+0x23c/0x250 [ 730.120860][T26140] should_fail_usercopy+0x16/0x20 [ 730.125906][T26140] _copy_from_user+0x1c/0xd0 [ 730.130485][T26140] sctp_setsockopt+0xd8/0x8870 [ 730.135252][T26140] sock_common_setsockopt+0x5d/0x70 [ 730.140440][T26140] ? sock_common_recvmsg+0xe0/0xe0 [ 730.145539][T26140] __sys_setsockopt+0x209/0x2a0 [ 730.150384][T26140] __x64_sys_setsockopt+0x62/0x70 [ 730.155400][T26140] do_syscall_64+0x44/0xd0 [ 730.159913][T26140] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 730.165812][T26140] RIP: 0033:0x7f0891846ae9 [ 730.170226][T26140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 730.190010][T26140] RSP: 002b:00007f0890fbd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 730.198416][T26140] RAX: ffffffffffffffda RBX: 00007f0891959f60 RCX: 00007f0891846ae9 11:03:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) (fail_nth: 3) [ 730.206371][T26140] RDX: 0000000000000001 RSI: 0000000000000084 RDI: 0000000000000003 [ 730.214327][T26140] RBP: 00007f0890fbd1d0 R08: 0000000000000014 R09: 0000000000000000 [ 730.222285][T26140] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 730.230245][T26140] R13: 00007ffc82ad702f R14: 00007f0890fbd300 R15: 0000000000022000 [ 730.238216][T26140] [ 730.243469][T26143] loop1: detected capacity change from 0 to 262160 [ 730.254652][T26145] loop5: detected capacity change from 0 to 262160 [ 730.274920][T26148] loop3: detected capacity change from 0 to 262160 [ 730.276783][T26149] FAULT_INJECTION: forcing a failure. [ 730.276783][T26149] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 730.294509][T26149] CPU: 0 PID: 26149 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 730.303333][T26149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.313403][T26149] Call Trace: [ 730.316679][T26149] [ 730.319613][T26149] dump_stack_lvl+0xd6/0x122 [ 730.324220][T26149] dump_stack+0x11/0x1b [ 730.328378][T26149] should_fail+0x23c/0x250 [ 730.332793][T26149] should_fail_usercopy+0x16/0x20 [ 730.337893][T26149] _copy_to_user+0x1c/0x90 [ 730.342381][T26149] simple_read_from_buffer+0xab/0x120 [ 730.347786][T26149] proc_fail_nth_read+0x10d/0x150 [ 730.352859][T26149] ? proc_fault_inject_write+0x230/0x230 [ 730.358711][T26149] vfs_read+0x1e6/0x750 [ 730.362883][T26149] ? __fget_files+0x20d/0x220 [ 730.367595][T26149] ksys_read+0xd9/0x190 11:03:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000007a) [ 730.371759][T26149] __x64_sys_read+0x3e/0x50 [ 730.376312][T26149] do_syscall_64+0x44/0xd0 [ 730.380732][T26149] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 730.386641][T26149] RIP: 0033:0x7f08917f969c [ 730.391060][T26149] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 730.410666][T26149] RSP: 002b:00007f0890fbd170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 11:03:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000032) 11:03:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005d00) 11:03:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) 11:03:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x29, 0x1, &(0x7f0000000000), 0x14) [ 730.419084][T26149] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f08917f969c [ 730.427178][T26149] RDX: 000000000000000f RSI: 00007f0890fbd1e0 RDI: 0000000000000004 [ 730.435165][T26149] RBP: 00007f0890fbd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 730.443170][T26149] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 730.451179][T26149] R13: 00007ffc82ad702f R14: 00007f0890fbd300 R15: 0000000000022000 [ 730.459160][T26149] [ 730.510916][T26161] loop1: detected capacity change from 0 to 262160 [ 730.524972][T26165] loop5: detected capacity change from 0 to 262160 [ 730.525149][T26164] loop3: detected capacity change from 0 to 262160 11:03:47 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007f00) 11:03:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000), 0x14) 11:03:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000007b) 11:03:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = geteuid() setresuid(r2, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000180), 0x2000, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u}, {@cache_none}, {@uname={'uname', 0x3d, '@%'}}, {@fscache}, {@access_user}, {@cache_mmap}, {@posixacl}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 11:03:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005e00) 11:03:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000033) 11:03:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x3, &(0x7f0000000000), 0x14) 11:03:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x4, &(0x7f0000000000), 0x14) 11:03:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80005f00) 11:03:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x5, &(0x7f0000000000), 0x14) [ 730.815588][T26176] loop5: detected capacity change from 0 to 262160 [ 730.823251][T26177] loop0: detected capacity change from 0 to 262160 [ 730.824165][T26179] loop3: detected capacity change from 0 to 262160 [ 730.836742][T26180] loop1: detected capacity change from 0 to 262160 11:03:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000007c) 11:03:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x6, &(0x7f0000000000), 0x14) [ 730.922023][T26194] loop5: detected capacity change from 0 to 262160 [ 730.966411][T26200] loop1: detected capacity change from 0 to 262160 11:03:48 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009000) 11:03:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r2 = dup2(r1, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0xc0182101, &(0x7f00000001c0)={r3}) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f00000000c0)={'security\x00', 0xb, "7481a427aa3efc13444d21"}, &(0x7f0000000180)=0x2f) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x4100000080000005) 11:03:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000034) 11:03:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x7, &(0x7f0000000000), 0x14) 11:03:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006000) 11:03:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000007d) 11:03:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x8, &(0x7f0000000000), 0x14) 11:03:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x9, &(0x7f0000000000), 0x14) 11:03:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0xa, &(0x7f0000000000), 0x14) 11:03:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000007e) 11:03:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0xb, &(0x7f0000000000), 0x14) 11:03:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000035) [ 731.206036][T26209] loop3: detected capacity change from 0 to 262160 [ 731.206880][T26210] loop1: detected capacity change from 0 to 262160 [ 731.213065][T26207] loop5: detected capacity change from 0 to 262160 [ 731.227870][T26212] loop0: detected capacity change from 0 to 262160 [ 731.311445][T26225] loop1: detected capacity change from 0 to 262160 [ 731.329629][T26229] loop3: detected capacity change from 0 to 262160 11:03:48 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a000) 11:03:48 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)) 11:03:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006100) 11:03:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0xc, &(0x7f0000000000), 0x14) 11:03:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000082) 11:03:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000036) 11:03:48 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b000) 11:03:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0xd, &(0x7f0000000000), 0x14) [ 732.084340][T26242] loop5: detected capacity change from 0 to 262160 [ 732.090771][T26246] loop3: detected capacity change from 0 to 262160 [ 732.092994][T26247] loop1: detected capacity change from 0 to 262160 11:03:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x10, &(0x7f0000000000), 0x14) 11:03:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000037) 11:03:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006200) 11:03:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000083) 11:03:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x11, &(0x7f0000000000), 0x14) 11:03:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x2b00010, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', r1, &(0x7f0000000180)='./bus\x00', 0x0) sendfile(r0, r1, 0x0, 0x80000001) bind$unix(r1, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 11:03:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x14) [ 732.155092][T26253] loop0: detected capacity change from 0 to 262160 11:03:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x13, &(0x7f0000000000), 0x14) 11:03:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x14, &(0x7f0000000000), 0x14) 11:03:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x15, &(0x7f0000000000), 0x14) [ 732.225435][T26267] loop3: detected capacity change from 0 to 262160 [ 732.241503][T26272] loop5: detected capacity change from 0 to 262160 [ 732.241647][T26269] loop1: detected capacity change from 0 to 262160 [ 732.248701][T26273] loop0: detected capacity change from 0 to 262160 11:03:49 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000c000) 11:03:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x16, &(0x7f0000000000), 0x14) 11:03:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006300) 11:03:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000038) 11:03:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000084) 11:03:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000039) 11:03:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x17, &(0x7f0000000000), 0x14) [ 732.371985][T26284] loop5: detected capacity change from 0 to 262160 [ 732.371992][T26285] loop3: detected capacity change from 0 to 262160 [ 732.385499][T26289] loop1: detected capacity change from 0 to 262160 [ 732.441982][T26297] loop3: detected capacity change from 0 to 262160 11:03:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r3 = dup2(r2, r2) write$binfmt_aout(r0, &(0x7f00000003c0)={{0x107, 0x40, 0x3f, 0x34a, 0x1f7, 0x40, 0x3d, 0x2e03}, "ab43571647c304cb2f92c32c261d396d451ae58a06286d099237e7657893", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x63e) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0xc0182101, &(0x7f00000001c0)={r4}) sendfile(r3, r1, 0x0, 0x80020001) 11:03:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x18, &(0x7f0000000000), 0x14) 11:03:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000085) 11:03:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006400) 11:03:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003a) [ 732.492786][T26273] loop0: detected capacity change from 0 to 262160 [ 732.547477][T26308] loop1: detected capacity change from 0 to 262160 [ 732.548017][T26307] loop5: detected capacity change from 0 to 262160 [ 732.566907][T26310] loop3: detected capacity change from 0 to 262160 [ 732.569825][T26312] loop0: detected capacity change from 0 to 262160 11:03:49 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000d000) 11:03:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x19, &(0x7f0000000000), 0x14) 11:03:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006500) 11:03:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003b) 11:03:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000086) 11:03:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1e, &(0x7f0000000000), 0x14) 11:03:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x21, &(0x7f0000000000), 0x14) [ 732.707706][T26323] loop3: detected capacity change from 0 to 262160 [ 732.711826][T26322] loop1: detected capacity change from 0 to 262160 [ 732.723988][T26325] loop5: detected capacity change from 0 to 262160 11:03:50 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYRES64]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x9, 0x69, 0x0, 0xff, 0x0, 0xa5d, 0x4, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000240), 0x8}, 0x41, 0x1, 0xffffffff, 0xc, 0x100000001, 0x5, 0x6, 0x0, 0x80000001, 0x0, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x4, 0x4, 0x7, 0x2, 0x0, 0xb04b, 0x40000, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000180), 0xa}, 0x50283, 0x100000001, 0x1, 0x4, 0x3ff, 0x0, 0xe2b8, 0x0, 0x5, 0x0, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x2) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x101) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r3 = dup2(r2, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0xc0182101, &(0x7f00000001c0)={r4}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000380)={0x2, 0x80, 0x3c, 0x5, 0x9, 0xc, 0x0, 0x2, 0x41, 0xe, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x167, 0x4, @perf_config_ext={0x6, 0x4}, 0x2, 0xe01, 0x9, 0x8, 0x6, 0x7fff, 0x0, 0x0, 0x1000, 0x0, 0x80000001}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x80000001) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x1000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000340)='vfat\x00') 11:03:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003c) 11:03:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x22, &(0x7f0000000000), 0x14) 11:03:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000087) 11:03:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006600) 11:03:50 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000e000) 11:03:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x23, &(0x7f0000000000), 0x14) [ 733.476836][T26343] loop5: detected capacity change from 0 to 262160 [ 733.478385][T26345] loop1: detected capacity change from 0 to 262160 [ 733.484664][T26344] loop3: detected capacity change from 0 to 262160 11:03:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x24, &(0x7f0000000000), 0x14) 11:03:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000088) 11:03:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x25, &(0x7f0000000000), 0x14) [ 733.518061][T26350] FAT-fs (loop0): Unrecognized mount option "1844674407370955161501777777777777777777777ÿÿÿÿÿÿÿÿ" or missing value 11:03:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x36, &(0x7f0000000000), 0x14) 11:03:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003d) [ 733.604730][T26361] loop1: detected capacity change from 0 to 262160 [ 733.632070][T26363] loop3: detected capacity change from 0 to 262160 [ 734.353441][ T24] kauditd_printk_skb: 1781 callbacks suppressed [ 734.353449][ T24] audit: type=1326 audit(1638788631.159:1098908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26347 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 734.384198][ T24] audit: type=1326 audit(1638788631.159:1098909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26347 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=33 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 734.408382][ T24] audit: type=1326 audit(1638788631.159:1098910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26347 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 734.432676][ T24] audit: type=1326 audit(1638788631.159:1098911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26347 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 734.456916][ T24] audit: type=1326 audit(1638788631.159:1098912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26347 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 734.481257][ T24] audit: type=1326 audit(1638788631.159:1098913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26347 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 734.505573][ T24] audit: type=1326 audit(1638788631.159:1098914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26347 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 734.529865][ T24] audit: type=1326 audit(1638788631.159:1098915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26347 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x64, &(0x7f0000000000), 0x14) 11:03:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006700) 11:03:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000089) 11:03:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003e) 11:03:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) perf_event_open(0x0, 0xffffffffffffffff, 0x12, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x400002, 0x101) sendfile(r0, r1, 0x0, 0x80000001) 11:03:51 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000f000) [ 734.554110][ T24] audit: type=1326 audit(1638788631.159:1098916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26347 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 [ 734.578364][ T24] audit: type=1326 audit(1638788631.159:1098917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26347 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc74e83ae9 code=0x7fc00000 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x65, &(0x7f0000000000), 0x14) 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x6b, &(0x7f0000000000), 0x14) [ 734.633160][T26377] loop3: detected capacity change from 0 to 262160 [ 734.640034][T26374] loop5: detected capacity change from 0 to 262160 [ 734.648618][T26379] loop1: detected capacity change from 0 to 262160 [ 734.661950][T26381] loop0: detected capacity change from 0 to 262160 11:03:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000041) 11:03:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006800) 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x6e, &(0x7f0000000000), 0x14) 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x71, &(0x7f0000000000), 0x14) 11:03:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008a) 11:03:51 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x85, 0x2, &(0x7f0000000200)=[{&(0x7f0000000300)="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", 0x1000, 0x6}, {&(0x7f0000001300)="44e0832535d2aff9abc73b5f38c4a5072f8ce474d3c0eba4bd010e00cc3c580f6ce8f478952b09033e905e83b19b1f1b88c70ea7343fea62816f1e4ebeb4644ecdbcedb758c929f46c7c00e6fa0032dd3d9596d1fa07537553de7140a97b35c405eafe8473b51262cb4d48d1d37117245dec532646ab8d7d0656e5213ea857eed95bbd2336b5cb5ac921f374a18e0c82824843a46da7db3d4e4170465acc92e827dda5f9ea1fff71cdf5ea51799cedf0cb68b1df3ac8f5ca2f55547c0ebb0f56f8f0", 0xc2, 0x20}], 0x21002, &(0x7f0000001400)={[{@nodots}, {@dots}, {@fat=@nfs_nostale_ro}, {@nodots}, {@nodots}, {@fat=@usefree}, {@dots}, {@nodots}, {@nodots}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}]}) openat(r2, &(0x7f0000000280)='./bus\x00', 0x10042, 0x5) 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x72, &(0x7f0000000000), 0x14) 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x75, &(0x7f0000000000), 0x14) 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x76, &(0x7f0000000000), 0x14) [ 734.783093][T26395] loop5: detected capacity change from 0 to 262160 [ 734.794767][T26398] loop3: detected capacity change from 0 to 262160 [ 734.816441][T26401] loop0: detected capacity change from 0 to 262160 [ 734.823941][T26405] loop1: detected capacity change from 0 to 262160 11:03:51 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000f100) 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x77, &(0x7f0000000000), 0x14) 11:03:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006900) 11:03:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000042) 11:03:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r1, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000005}, 0x40008c0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x24) sendfile(0xffffffffffffffff, r3, 0x0, 0x80000001) 11:03:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008b) 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x78, &(0x7f0000000000), 0x14) 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x79, &(0x7f0000000000), 0x14) 11:03:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000043) [ 734.956135][T26420] loop0: detected capacity change from 0 to 262160 [ 734.958467][T26422] loop5: detected capacity change from 0 to 262160 [ 734.963001][T26421] loop1: detected capacity change from 0 to 262160 [ 734.972034][T26423] loop3: detected capacity change from 0 to 262160 [ 734.981791][T26420] FAT-fs (loop0): Unrecognized mount option "" or missing value 11:03:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006a00) 11:03:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x7b, &(0x7f0000000000), 0x14) 11:03:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008c) [ 735.036168][T26420] loop0: detected capacity change from 0 to 262160 [ 735.074051][T26438] loop3: detected capacity change from 0 to 262160 [ 735.075374][T26420] FAT-fs (loop0): Unrecognized mount option "" or missing value [ 735.103020][T26441] loop5: detected capacity change from 0 to 262160 [ 735.117470][T26443] loop1: detected capacity change from 0 to 262160 [ 735.141541][ T1401] ================================================================== [ 735.149829][ T1401] BUG: KCSAN: data-race in __jbd2_journal_drop_transaction / start_this_handle [ 735.158746][ T1401] [ 735.161063][ T1401] write to 0xffff888103134078 of 8 bytes by task 1819 on cpu 0: [ 735.168675][ T1401] start_this_handle+0xd37/0x1050 [ 735.173683][ T1401] jbd2__journal_start+0x1fc/0x3f0 [ 735.178770][ T1401] __ext4_journal_start_sb+0x159/0x310 [ 735.184207][ T1401] __ext4_new_inode+0xd95/0x2fc0 [ 735.189212][ T1401] ext4_mkdir+0x28a/0x760 [ 735.193522][ T1401] vfs_mkdir+0x2c8/0x3d0 [ 735.197837][ T1401] do_mkdirat+0x12e/0x2c0 [ 735.202158][ T1401] __x64_sys_mkdir+0x40/0x50 [ 735.206825][ T1401] do_syscall_64+0x44/0xd0 [ 735.211222][ T1401] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 735.217119][ T1401] [ 735.219431][ T1401] read to 0xffff888103134078 of 8 bytes by task 1401 on cpu 1: [ 735.226959][ T1401] __jbd2_journal_drop_transaction+0x1f0/0x2f0 [ 735.233090][ T1401] __jbd2_journal_remove_checkpoint+0x2d5/0x3a0 [ 735.239405][ T1401] jbd2_journal_commit_transaction+0x23f1/0x3460 [ 735.245891][ T1401] kjournald2+0x263/0x480 [ 735.250204][ T1401] kthread+0x2c7/0x2e0 [ 735.254256][ T1401] ret_from_fork+0x1f/0x30 [ 735.258653][ T1401] [ 735.260970][ T1401] value changed: 0x0000000000000000 -> 0xffff888138d3e900 [ 735.268068][ T1401] [ 735.270368][ T1401] Reported by Kernel Concurrency Sanitizer on: [ 735.276501][ T1401] CPU: 1 PID: 1401 Comm: jbd2/sda1-8 Not tainted 5.16.0-rc4-syzkaller #0 [ 735.284886][ T1401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.294919][ T1401] ================================================================== 11:03:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000044) 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x7c, &(0x7f0000000000), 0x14) 11:03:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c7a42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x101000, 0x49, 0x18}, 0x18) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f00000001c0)=0x6) sendfile(r0, r1, 0x0, 0x80000001) 11:03:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006b00) 11:03:52 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000f200) 11:03:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008d) 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x7d, &(0x7f0000000000), 0x14) 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x82, &(0x7f0000000000), 0x14) [ 735.526465][T26454] loop5: detected capacity change from 0 to 262160 [ 735.527706][T26453] loop3: detected capacity change from 0 to 262160 [ 735.541981][T26457] loop1: detected capacity change from 0 to 262160 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x83, &(0x7f0000000000), 0x14) 11:03:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006c00) 11:03:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000045) 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x84, &(0x7f0000000000), 0x14) [ 735.601794][T26463] loop0: detected capacity change from 0 to 262160 11:03:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008e) 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x85, &(0x7f0000000000), 0x14) [ 735.652455][T26473] loop5: detected capacity change from 0 to 262160 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x300, &(0x7f0000000000), 0x14) 11:03:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006d00) [ 735.693947][T26478] loop3: detected capacity change from 0 to 262160 [ 735.710476][T26481] loop1: detected capacity change from 0 to 262160 [ 735.760092][T26488] loop5: detected capacity change from 0 to 262160 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) 11:03:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000000c0)="eb3c8f000000732e666174000201016589417548290002", 0x17}, {0x0, 0x0, 0x8}], 0x0, &(0x7f0000000180)=ANY=[]) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r1 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000001c0)={r2}) getdents64(r1, &(0x7f0000000180), 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) 11:03:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000046) 11:03:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000008f) 11:03:52 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000f300) 11:03:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006e00) 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x2}, 0x14) 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x2}, 0x14) 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x14) 11:03:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000090) [ 735.838030][T26496] loop5: detected capacity change from 0 to 262160 [ 735.839777][T26498] loop3: detected capacity change from 0 to 262160 [ 735.854312][T26499] loop1: detected capacity change from 0 to 262160 [ 735.862738][T26495] FAT-fs (loop0): bogus number of reserved sectors [ 735.869341][T26495] FAT-fs (loop0): Can't find a valid FAT filesystem 11:03:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}, 0x14) [ 735.971934][T26519] loop1: detected capacity change from 0 to 262160 11:03:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./bus\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80006f00) 11:03:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000047) 11:03:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000000}, 0x14) 11:03:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000091) 11:03:53 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000f400) 11:03:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) 11:03:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) [ 736.793394][T26528] loop3: detected capacity change from 0 to 262160 [ 736.795891][T26530] loop5: detected capacity change from 0 to 262160 [ 736.815363][T26533] loop1: detected capacity change from 0 to 262160 [ 736.815641][T26535] loop0: detected capacity change from 0 to 262160 11:03:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007000) 11:03:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000048) 11:03:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x14) 11:03:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000092) [ 736.921199][T26546] loop5: detected capacity change from 0 to 262160 [ 736.932094][T26548] loop1: detected capacity change from 0 to 262160 [ 736.948120][T26550] loop3: detected capacity change from 0 to 262160 11:03:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000093) 11:03:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x14) 11:03:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007100) 11:03:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000049) 11:03:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) 11:03:53 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000f500) 11:03:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) [ 737.062617][T26562] loop1: detected capacity change from 0 to 262160 [ 737.063435][T26563] loop3: detected capacity change from 0 to 262160 [ 737.070776][T26560] loop5: detected capacity change from 0 to 262160 11:03:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x14) 11:03:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007200) 11:03:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004a) 11:03:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x14) 11:03:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000094) 11:03:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x11000) 11:03:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x20000014) 11:03:54 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r1 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000001c0)={r2}) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f00000003c0)={{}, {0xfffffffffffeffff}, 0x0, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="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", 0x1a7, 0x0, &(0x7f0000000280)={0x2, 0x54, {0x0, 0xc, 0x14, "af02ece6fe947d8b679d4ef12f7ba2e9c43756bf", 0x33, "0618072dcf156b095252e92c86edd86c45762c6071e13e48d459c7f3c9d0bea14a984acf5a870d4a10e0fca701b4baeea65f10"}, 0xd3, "97b141d750456d9ddbe47e9af4c3c0a423dc4763d1dd2209a5077016d3a98f741fe9bef569305f71c58d7e41b226328d7872885c5e25a6d3577e3b9f14b87707b13c7f844f3c28699dfbbba68bc2e9ebfa91d30a79722e6906d4302510f36d80a8052b943111d74d7f9998fe6082178dbfc5c78ee3112f8b8620119ca81886f7c5a0017bc5272ec894de738e9a09da902697cc2b6aebff200237b41fd7507a7cf78aa604e2327c5118bf94c1e076f5335aaed62c10da6f42564315a8107847b8be9fc23de2c55b1436d71b416f5d31653c0aa8"}, 0x133}) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000), 0x14) [ 737.218408][T26584] loop3: detected capacity change from 0 to 262160 [ 737.227437][T26586] loop1: detected capacity change from 0 to 262160 [ 737.227465][T26580] loop5: detected capacity change from 0 to 262160 11:03:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004b) 11:03:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007300) [ 737.365841][T26596] loop5: detected capacity change from 0 to 262160 [ 737.366677][T26594] loop3: detected capacity change from 0 to 262160 11:03:54 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000f600) 11:03:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000095) 11:03:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007400) 11:03:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004c) [ 737.435026][T26601] loop1: detected capacity change from 0 to 262160 [ 737.473649][T26604] loop5: detected capacity change from 0 to 262160 11:03:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000096) 11:03:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007500) 11:03:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004d) [ 737.484020][T26606] loop3: detected capacity change from 0 to 262160 11:03:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000097) [ 737.542679][T26612] loop1: detected capacity change from 0 to 262160 [ 737.571633][T26614] loop5: detected capacity change from 0 to 262160 11:03:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007600) [ 737.592644][T26617] loop3: detected capacity change from 0 to 262160 [ 737.622358][T26619] loop1: detected capacity change from 0 to 262160 [ 737.711048][T26624] loop5: detected capacity change from 0 to 262160 11:03:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_ADD(r3, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x34, r1, 0x800, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x5ef70d6a15cf94d2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r3, &(0x7f0000000340)={0x0, 0xffffffffffffff49, &(0x7f0000000300)={&(0x7f0000000380)={0x38, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_SEC_DEVKEY={0x1c, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x5}]}]}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x70, r4, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_CCA_MODE={0x8, 0xc, 0x1}, @NL802154_ATTR_CCA_MODE={0x8, 0xc, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_CCA_MODE={0x8, 0xc, 0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240), r2) sendmsg$NLBL_CALIPSO_C_ADD(r8, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x5c, r9, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40880) r10 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r10, 0x84, 0x1, &(0x7f0000000000), 0x14) 11:03:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000098) 11:03:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004e) 11:03:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007700) 11:03:55 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000f700) 11:03:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80000001) r5 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0xffffffffffffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000640)=ANY=[@ANYRES64=r2, @ANYBLOB="0000000000000000d30c0000000000000100010000000000090000000000000001010000000000000400000000000000fe000000ffffff7f0800000081000000060000000000000040000000000000000100000000000000ff030000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000027a6ff332ef35cc1a0600c9cbea5c1db48286bfc45ed19ed7cd6ce8e3245b03531807b69b1629da111cafb9773e79b68279f5f111f9219ec182016fe"]) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f000004bac0)={r3, r2, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057ec0)={0x0, ""/256, 0x0, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0xffffffffffffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057ec0)={0x0, ""/256, 0x0, 0x0}) r13 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r13, 0xd000943d, &(0x7f0000058c40)={0xffffffffffffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x1, "2156816c73038c"}) r15 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r15, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r17, r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r16}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004cac0)={0xfffffffffffffffd, [{0x0, r3}, {0x0, r3}, {r1, r3}, {}, {r2, r3}, {0x0, r3}, {r1, r3}, {0x0, r3}, {r1, r3}, {r2}, {}, {r2}, {}, {0x0, r3}, {}, {r2}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r2, r3}, {r1, r3}, {}, {r2, r3}, {r1}, {}, {r2, r3}, {r2, r3}, {r2, r3}, {r1}, {}, {r2, r3}, {0x0, r3}, {r1}, {r2}, {}, {}, {r1}, {0x0, r3}, {r1, r3}, {0x0, r3}, {}, {r2}, {r2}, {r1, r3}, {r1}, {}, {r1, r3}, {r2}, {r2}, {r2}, {}, {}, {0x0, r3}, {0x0, r3}, {r1}, {r2}, {}, {}, {r2}, {0x0, r3}, {0x0, r3}, {r2, r3}, {r2}, {r2}, {r1, r3}, {}, {0x0, r3}, {}, {r1}, {r2, r3}, {r2}, {}, {}, {0x0, r3}, {0x0, r3}, {r2, r3}, {}, {r2, r3}, {0x0, r3}, {r2}, {}, {r2}, {0x0, r3}, {0x0, r3}, {r2}, {}, {r2, r3}, {r1}, {r2}, {}, {r1, r3}, {}, {}, {r1, r3}, {}, {r1, r3}, {0x0, r3}, {r1}, {r2, r3}, {}, {0x0, r3}, {r2}, {}, {r1}, {r1, r3}, {0x0, r3}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {}, {r2, r3}, {}, {r1}, {}, {0x0, r3}, {r2, r3}, {}, {0x0, r3}, {r2}, {}, {r2, r3}, {r1, r3}, {0x0, r3}, {r1, r3}, {0x0, r3}, {r1}, {}, {r1}, {}, {}, {r2}, {}, {r2, r3}, {0x0, r3}, {0x0, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {0x0, r3}, {}, {r2}, {r1, r3}, {0x0, r3}, {0x0, r3}, {}, {r2, r3}, {}, {}, {0x0, r3}, {r1}, {r2}, {r1}, {r2, r3}, {r1}, {r2, r3}, {}, {0x0, r3}, {}, {r1}, {}, {0x0, r3}, {}, {r2, r3}, {r2}, {}, {r1, r3}, {}, {}, {}, {r1}, {r2}, {r1}, {r1}, {}, {}, {}, {r1}, {0x0, r3}, {r2, r3}, {}, {r1}, {r1, r3}, {}, {}, {0x0, r3}, {}, {0x0, r3}, {}, {}, {r1}, {0x0, r3}, {}, {r2}, {r1, r3}, {0x0, r3}, {r2}, {}, {}, {0x0, r3}, {}, {}, {0x0, r3}, {}, {}, {}, {0x0, r3}, {}, {0x0, r3}, {0x0, r3}, {}, {r2, r3}, {}, {}, {0x0, r3}, {r2}, {r2}, {r2}, {r1}, {}, {r1}, {r2}, {r1}, {r1}, {r1, r3}, {r1}, {r2, r3}, {0x0, r3}, {}, {r1}, {0x0, r3}, {r1}, {}, {r2}, {r1, r3}, {r1}, {r1}, {}, {r1}, {r2}, {0x0, r3}, {}, {}, {r2}, {}, {}, {0x0, r3}, {r1, r3}, {0x0, r3}, {}, {r6, r7}, {r2, r3}, {r1, r8}, {r2, r3}, {r16, r3}], 0x9, "9026aa7d84afd0"}) 11:03:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004f) 11:03:55 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r0, r0, 0x80000) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0x401, @rand_addr=' \x01\x00', 0x9}, @in={0x2, 0x4e1f, @empty}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e24, 0x1, @empty, 0x3f}, @in6={0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, 0x9}, @in6={0xa, 0x4e23, 0x100040, @remote, 0x5}, @in={0x2, 0x4e21, @empty}], 0xb0) 11:03:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}, {&(0x7f0000000180)="f819d03f146b94a1b428ec87588b73e470302b1db86678fdac31ac4c8724b5a49c815e5d35d3c1d54dea03777a0e502c70d6a3f41c77130d29d78cfcfdf11fc916597d8b15ebc082daea86350c09f2e01998a3c4a667c00b93ec3f798dad7b955f227829245149", 0x67, 0xc0e}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:55 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r1, 0x1, 0x0, 0x80000001, 0x7ff, 0xfffffffd}, 0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0)={r1, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r2, 0x6}, 0x8) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r4 = dup2(r3, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0xc0182101, &(0x7f00000001c0)={r5}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x2998e208, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x101}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x3f, @rand_addr=' \x01\x00'}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x37}}, @in={0x2, 0x4e20, @empty}], 0x78) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000200)={r2, 0xa2, "ba4043a1fea8835490b40731c61313e4e6ef24304530bba2737ea9913f898133afa96a6a8a04b73861f5fcdb36e24ccd8526052d68989fc80b71132ab6e43428846482029ebaaab8803f22717d88ca800856c3f0c2ddae5e42520811b5222b05ea8621175b8e7c82abf1b20a61ad4bf3285669e6ce170b4ca678354e06d91980c5b484186e8a2ca4518667f4fa0f854969e74b96356d5c7fdda5fd888f2b45c279f6"}, &(0x7f00000002c0)=0xaa) [ 738.215191][T26630] loop5: detected capacity change from 0 to 262160 [ 738.223227][T26634] loop3: detected capacity change from 0 to 262160 [ 738.226020][T26635] loop1: detected capacity change from 0 to 262160 [ 738.236744][T26637] loop0: detected capacity change from 0 to 262160 11:03:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007800) 11:03:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000099) [ 738.323843][T26652] loop3: detected capacity change from 0 to 262160 [ 738.330110][T26654] loop0: detected capacity change from 0 to 262160 [ 738.337416][T26656] loop5: detected capacity change from 0 to 262160 [ 738.345110][T26654] FAT-fs (loop0): Unrecognized mount option "øÐ?k”¡´(ì‡X‹säp0+¸fxý¬1¬L‡$µ¤œ^]5ÓÁÕMêwzP" or missing value 11:03:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000050) 11:03:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007900) [ 738.370777][T26658] loop1: detected capacity change from 0 to 262160 11:03:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009a) 11:03:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000051) [ 738.425065][T26664] loop3: detected capacity change from 0 to 262160 [ 738.462014][T26667] loop5: detected capacity change from 0 to 262160 11:03:55 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000f800) 11:03:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007a00) [ 738.483638][T26670] loop1: detected capacity change from 0 to 262160 [ 738.497409][T26673] loop3: detected capacity change from 0 to 262160 11:03:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009b) 11:03:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000052) 11:03:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x4) sendfile(r0, r1, 0x0, 0x80000001) [ 738.534658][T26654] loop0: detected capacity change from 0 to 262160 [ 738.542117][T26677] loop5: detected capacity change from 0 to 262160 [ 738.542792][T26654] FAT-fs (loop0): Unrecognized mount option "øÐ?k”¡´(ì‡X‹säp0+¸fxý¬1¬L‡$µ¤œ^]5ÓÁÕMêwzP" or missing value [ 738.590577][T26681] loop3: detected capacity change from 0 to 262160 [ 738.599784][T26684] loop0: detected capacity change from 0 to 262160 [ 738.602348][T26686] loop1: detected capacity change from 0 to 262160 11:03:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) 11:03:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007b00) 11:03:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009c) 11:03:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000053) 11:03:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x9, 0x50, r0, 0x50bae000) sendfile(r0, r1, 0x0, 0x80000001) 11:03:56 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000f900) 11:03:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @multicast1}], 0x60) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r1, 0x8000}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e21, @local}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x33}}, @in6={0xa, 0x4e20, 0x1000, @private2={0xfc, 0x2, '\x00', 0x1}, 0xc499}], 0x3c) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) [ 739.198787][T26698] loop5: detected capacity change from 0 to 262160 [ 739.203707][T26703] loop0: detected capacity change from 0 to 262160 [ 739.207301][T26701] loop1: detected capacity change from 0 to 262160 [ 739.212269][T26704] loop3: detected capacity change from 0 to 262160 11:03:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007c00) 11:03:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r2 = dup2(r1, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0xc0182101, &(0x7f00000001c0)={r3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="8e00000010a587d6521ec48dd21c1bc22a34f2e3ddbe2743c4aa7a8317e2200af1b9e66d643989f2de1f4741e863cd15d3df88e3b52e5eb602a4490f38aa75e1ff89a790c37127f815794f5af5c6a8aeb4bdb2d421cd685703296c655beae62ebebf2f2dab014236b8934ee3c1939eb9d2bf402a99f238581e2a7e2360e31dd81ac5b60f37e8394db74f5f8836d324840ab978ede8ca5e75013bd0c55ac70d10750875fd47d54ff8be47b321b0562ba63f1b024789ec46ddea5edb86f57bdb413966262031d15c0da10fbcf8428747fa4eb3d28ba9566482880ab0de66c4d136c46f653559b35b24"], &(0x7f0000000100)=0x96) 11:03:56 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0xc0b42, 0x4) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x3}}, './bus\x00'}) r3 = syz_open_dev$vcsn(&(0x7f0000000280), 0x4, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3, 0x0}, 0x8) r5 = dup3(r1, r0, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x9, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fff}, [@exit, @ldst={0x2, 0x0, 0x1, 0x5, 0x2, 0xfffffffffffffff4, 0xfffffffffffffff0}, @map={0x18, 0x2, 0x1, 0x0, r2}, @jmp={0x5, 0x1, 0x0, 0x4, 0xc, 0xffffffffffffffc0, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0x5, 0xa, 0x3, 0x2, 0xffffffffffffffff}]}, &(0x7f0000000200)='syzkaller\x00', 0x8, 0x72, &(0x7f0000000300)=""/114, 0x0, 0xa14c1522d47d3940, '\x00', 0x0, 0x4, r3, 0x8, &(0x7f0000000380)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x6, 0x6, 0x1ff}, 0x10, r4, r5}, 0x78) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x80000001) 11:03:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000054) 11:03:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009d) [ 739.323304][T26716] loop5: detected capacity change from 0 to 262160 [ 739.332432][T26718] loop0: detected capacity change from 0 to 264192 11:03:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007d00) 11:03:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c8f000000732e666174000201010002400080800100000000000000b0f3d6660932d50b0800000000000000e67d92dabe293e1695254e3d655adf3c53de31e13306f4e3b57cf9297c9b063ad570043adfe60656155e4a4c146671d92b9b10711768984a", 0x65}, {0x0, 0x0, 0x10000001000}, {&(0x7f00000000c0)="a08994f9b97815cb761aa61004443528a6100f1900f1752edb", 0x19, 0x1}, {&(0x7f0000000300)="f8718284876a4a8c79f56c800e34d654a992b9342faad8dbb9546724ce31a3f96dc49a3c5bb7ae0f376356280f9e09400832e57ee292fa0f198d868261850368a817547ca7898f340be34afbd59312b8f92e4d03358f673d811d83080d8364ea0533ed0c1b8034e0534075d0abb5bbbc9e3121e46fe5fff3d6fd8000d54e1e07685cdb8ea5b2804f58adbeda475d11dac764766e68f5cea5e46cc5ce2512d8f232afe236b4cbdcca78ccd85bf9b8654a02676e6fccdf4c62a4457080f5b50516e1f84c6e2abf7bd20305e2a93a01597d6578d813c9f8b85dffb6201739f87b55517a2b8c1c497db39ae7b453f7e43ec3a0677d833bcd406c", 0xf8, 0x9}], 0x12000, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) [ 739.366571][T26722] loop1: detected capacity change from 0 to 262160 [ 739.376819][T26724] loop3: detected capacity change from 0 to 262160 11:03:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009e) 11:03:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000055) 11:03:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007e00) [ 739.412345][T26729] loop5: detected capacity change from 0 to 262160 [ 739.442298][T26733] loop0: detected capacity change from 0 to 262160 11:03:56 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fa00) 11:03:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000056) 11:03:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007f00) [ 739.462044][T26735] loop3: detected capacity change from 0 to 262160 [ 739.482010][T26738] loop5: detected capacity change from 0 to 262160 [ 739.488104][T26739] loop1: detected capacity change from 0 to 262160 [ 739.598050][T26747] loop3: detected capacity change from 0 to 262160 [ 739.599805][T26748] loop5: detected capacity change from 0 to 262160 [ 739.631975][T26733] loop0: detected capacity change from 0 to 262160 [ 740.143873][ T24] kauditd_printk_skb: 4625 callbacks suppressed [ 740.143888][ T24] audit: type=1326 audit(1638788636.949:1103543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26713 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 740.174636][ T24] audit: type=1326 audit(1638788636.949:1103544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26713 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=33 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 740.199082][ T24] audit: type=1326 audit(1638788636.949:1103545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26713 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 740.223442][ T24] audit: type=1326 audit(1638788636.949:1103546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26713 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 740.247717][ T24] audit: type=1326 audit(1638788636.949:1103547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26713 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 740.272068][ T24] audit: type=1326 audit(1638788636.949:1103548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26713 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 740.296393][ T24] audit: type=1326 audit(1638788636.949:1103549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26713 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007f4a) 11:03:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000009f) 11:03:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000057) 11:03:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') lsetxattr$security_evm(&(0x7f0000000180)='./bus/file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x2, "262d9cc96403"}, 0x7, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) chroot(&(0x7f00000000c0)='./bus\x00') ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000300)={{0x0, 0x5, 0x4, 0xffffffffffffff00, 0x7f, 0xf8, 0x8, 0x8, 0x8, 0x1, 0xbc, 0x100, 0x4, 0x6, 0x7fff}, 0x30, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 740.320856][ T24] audit: type=1326 audit(1638788636.949:1103550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26713 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 740.345125][ T24] audit: type=1326 audit(1638788636.949:1103551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26713 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 [ 740.369486][ T24] audit: type=1326 audit(1638788636.949:1103552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26713 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0891846ae9 code=0x7fc00000 11:03:57 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fb00) 11:03:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040)=0x1, 0x4) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r2 = dup2(r1, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000002c0)={@dev={0xfe, 0x80, '\x00', 0xc}, @remote, @remote, 0x2, 0x800, 0x3, 0x100, 0xd, 0x40000000}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x10200, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0xc0182101, &(0x7f00000001c0)={r3}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r7, 0x0, 0x4}, 0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r7, @in6={{0xa, 0x4e23, 0xffffffff, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}}, 0x8001, 0x8}, 0x90) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000080)={'wg2\x00'}) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) [ 740.414203][T26759] loop0: detected capacity change from 0 to 262160 [ 740.419087][T26757] loop1: detected capacity change from 0 to 262160 [ 740.437109][T26761] loop3: detected capacity change from 0 to 262160 [ 740.444122][T26762] loop5: detected capacity change from 0 to 262160 11:03:57 executing program 0: sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x10000, 0x61}}}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x5}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xae}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5}, @NL80211_ATTR_BANDS={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x24000041) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 11:03:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007f4b) 11:03:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000058) [ 740.581091][T26773] loop0: detected capacity change from 0 to 262160 11:03:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a0) [ 740.624155][T26777] loop3: detected capacity change from 0 to 262160 [ 740.638614][T26778] loop5: detected capacity change from 0 to 262160 [ 740.645814][T26773] FAT-fs (loop0): Unrecognized mount option "H" or missing value 11:03:57 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fc00) 11:03:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000059) [ 740.693913][T26781] loop1: detected capacity change from 0 to 262160 11:03:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007f50) [ 740.766306][T26787] loop3: detected capacity change from 0 to 262160 [ 740.797247][T26773] loop0: detected capacity change from 0 to 262160 [ 740.800510][T26790] loop5: detected capacity change from 0 to 262160 [ 740.811818][T26773] FAT-fs (loop0): Unrecognized mount option "H" or missing value 11:03:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a1) 11:03:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0xc000, 0x2) recvmmsg$unix(r0, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/107, 0x6b}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/114, 0x72}, {&(0x7f0000001500)=""/88, 0x58}], 0x6, &(0x7f0000001a40)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000010000000200000003099b3c2be58a3bf8876d6e41396beb05ba56f13951c928a7fead688adc77db97a5cf5f9d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x78}}, {{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001680)=""/89, 0x59}, {&(0x7f0000001700)=""/151, 0x97}], 0x2, &(0x7f00000017c0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000001840)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000200)=""/46, 0x2e}], 0x1}}], 0x3, 0x40010140, 0x0) creat(&(0x7f00000019c0)='./file0\x00', 0x80) open(&(0x7f0000001a00)='./bus\x00', 0x200, 0x8) openat(r2, &(0x7f0000001980)='./file0\x00', 0x2000, 0x2) sendfile(r0, r1, 0x0, 0x80000001) 11:03:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005a) 11:03:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80007f59) [ 740.879602][T26793] loop0: detected capacity change from 0 to 262160 [ 740.910440][T26797] loop1: detected capacity change from 0 to 262160 [ 740.962916][T26799] loop3: detected capacity change from 0 to 262160 [ 740.985389][T26801] loop5: detected capacity change from 0 to 262160 11:03:58 executing program 2: socket$inet_sctp(0x2, 0x1, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000240)={0x0, 0x1, {0x80, @usage, 0x0, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, @usage=0x2, 0x0, 0x0, [0x0, 0x8, 0x8]}, {0x1f, @struct={0x435, 0x7}, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0x20, @usage=0x9, 0xa7, 0x0, [0x0, 0x4, 0x0, 0x0, 0x0, 0x3fe000000]}, {0x0, @struct={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x40, @usage, 0x0, 0x1, [0x0, 0x0, 0x1ff, 0x3ff, 0x0, 0xd781]}, {0x1ff}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000340)={{}, 0x0, 0x4, @unused=[0x0, 0x0, 0x6], @devid}) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100)=0x10000) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000100)=0x10000) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x0, {0x6, @struct={0x21}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x800, 0x2, @usage, 0x0, 0x10001, [0x1000, 0x0, 0x0, 0x62b1949c, 0x100, 0xa72]}, {0x0, @usage, 0x0, 0x1, 0x0, 0x1f, 0x100000001, 0x0, 0x403, @usage=0xafef, 0x0, 0x0, [0x0, 0x0, 0x3ff, 0x9, 0x40, 0x10000]}, {0x4, @struct={0x6}, r0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @usage, 0x8, 0x800, [0x0, 0x0, 0x0, 0x0, 0x800]}, {0x0, 0xffffffffffffffff, 0x100000001}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40808000, 0x0, 0x0, 0x0, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x82200, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r4, 0x0, 0x24, 0xd4, &(0x7f00000002c0)="435082380dd7ef06a4a80cbd2f74373613b193788916d91fe064c50b68a4d08fdaeed0c8", &(0x7f00000003c0)=""/212, 0x20, 0x0, 0x9e, 0xe8, &(0x7f00000004c0)="89086dc90062542863867fd2540447d31f52988bf0441d44856bb80cbbd62632a886e3f2cf3a9f333ff49f37b4520f60bfc69a4a07020f2ac8f8e09163ae0809f1b1e469bb296bb8dcac9ec04a26494e7894e353f048b31e645ac4ce1677e1e8660a6f5a692bc513aad3ff3f6168246b99d23ceae7125cd73568aaa83a7307ff2172b3b874e5ece8365b4ba572dbabbfdfc98b098b9b1d0928aa1b114cbf", &(0x7f0000000580)="f2bb9cc0e363beaffd7394c103f8bd1426c71cd5cca10c0923cba2a623047cd81234d088028176ba3c0db056ff6ab87a747ff5691835de0692c756729ec7d65e1f5d2824c3cd15887c00eb3ba49b1182827ffe7159082a3eebc8c12ab1bba1014d51c488d976fe4a564f9927c5633c8c2bde52b90b3ca0a3a891771a857b231d7c7296bb097f7a076c626a71fd84e2538298094016633d759e6de1f77bd3f049629cd5f163a9d3f832108a37e7087660e958c5f216d1a47f206c416a28752ded36b0a9d478fd99ecd4f18f0f09d94bf5eafbffe30056fbdec135df60a2e18eee46e63248d5310ae8", 0x1, 0x3}, 0x48) r5 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r5, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) socket$inet(0x2, 0x840000000003, 0x2) 11:03:58 executing program 0: truncate(&(0x7f00000000c0)='./bus\x00', 0x3) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) lsetxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x8, 0x1) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x120) sendfile(r0, r1, 0x0, 0x80000001) 11:03:58 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fd00) 11:03:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a2) 11:03:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005b) 11:03:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008100) 11:03:58 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = creat(&(0x7f0000003000)='./file0\x00', 0x60) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x80000) r3 = perf_event_open(&(0x7f0000003380)={0x3, 0x80, 0x1, 0x0, 0x90, 0x1, 0x0, 0x0, 0x204, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000003340)}, 0x5d00, 0x7f9, 0x6, 0x2, 0x3, 0xdec0, 0xf3, 0x0, 0x7f, 0x0, 0x280000}, 0xffffffffffffffff, 0x2, r1, 0x2) perf_event_open(&(0x7f00000032c0)={0x4, 0x80, 0x74, 0x9, 0x5, 0xc3, 0x0, 0x6, 0x110000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000080), 0xc}, 0x20000, 0x7, 0x7ff, 0x9, 0x2, 0x1ff, 0x1f, 0x0, 0xfff, 0x0, 0xff}, 0x0, 0xe, r3, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000003040)) sync_file_range(r0, 0x3, 0x1, 0x0) r4 = open(&(0x7f0000003280)='./bus\x00', 0x1c5b42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) recvmmsg(r4, &(0x7f0000002f40)=[{{&(0x7f0000000180)=@sco, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/137, 0x89}, {&(0x7f00000013c0)=""/163, 0xa3}], 0x3, &(0x7f0000001480)=""/176, 0xb0}, 0x8}, {{&(0x7f0000001540)=@alg, 0x80, &(0x7f0000002840)=[{&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f00000025c0)=""/145, 0x91}, {&(0x7f0000002680)=""/168, 0xa8}, {&(0x7f0000002740)=""/254, 0xfe}], 0x6}, 0x7}, {{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f00000028c0)=""/74, 0x4a}, {&(0x7f0000002940)=""/52, 0x34}, {&(0x7f0000002980)=""/231, 0xe7}, {&(0x7f0000002a80)=""/135, 0x87}, {&(0x7f0000002b40)=""/141, 0x8d}, {&(0x7f0000002c00)=""/69, 0x45}, {&(0x7f0000002c80)=""/37, 0x25}, {&(0x7f0000002cc0)=""/4, 0x4}, {&(0x7f0000002d00)=""/95, 0x5f}], 0x9, &(0x7f0000002e40)=""/231, 0xe7}, 0x8}], 0x3, 0x40000002, 0x0) sendfile(r4, r5, 0x0, 0x80000001) faccessat(r1, &(0x7f0000003240)='./bus\x00', 0x8) [ 741.456378][T26811] loop0: detected capacity change from 0 to 262160 [ 741.457925][T26816] loop1: detected capacity change from 0 to 262160 [ 741.463832][T26815] loop5: detected capacity change from 0 to 262160 [ 741.469831][T26817] loop3: detected capacity change from 0 to 262160 11:03:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008200) 11:03:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a3) 11:03:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005c) [ 741.529300][ C1] sd 0:0:1:0: tag#7696 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 741.539194][ C1] sd 0:0:1:0: tag#7696 CDB: opcode=0xe5 (vendor) [ 741.545559][ C1] sd 0:0:1:0: tag#7696 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 741.554608][ C1] sd 0:0:1:0: tag#7696 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 741.563643][ C1] sd 0:0:1:0: tag#7696 CDB[20]: ba [ 741.601263][T26827] loop0: detected capacity change from 0 to 262160 [ 741.629103][T26829] loop5: detected capacity change from 0 to 262160 11:03:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x189) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) sendfile(r0, r1, 0x0, 0x80000001) [ 741.645914][T26833] loop3: detected capacity change from 0 to 262160 [ 741.654525][T26834] loop1: detected capacity change from 0 to 262160 11:03:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005d) [ 741.751454][T26841] loop0: detected capacity change from 0 to 262160 [ 741.790673][T26846] loop3: detected capacity change from 0 to 262160 11:03:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a4) 11:03:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008300) 11:03:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r3 = dup2(r2, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0xc0182101, &(0x7f00000001c0)={r4}) accept4$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x14, 0x80000) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r7 = dup2(r6, r6) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r7, 0xc0182101, &(0x7f00000001c0)={r8}) r9 = openat$cgroup_ro(r0, &(0x7f0000000400)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, [@jmp={0x5, 0x0, 0x2, 0x4, 0x1, 0x0, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x1, 0xa, 0x0, 0x40, 0xc}, @btf_id={0x18, 0xf, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0x1, 0x3, 0x4, 0x2}, @generic={0x4, 0x6, 0x9, 0x9c}, @map={0x18, 0x2, 0x1, 0x0, r3}]}, &(0x7f0000000200)='GPL\x00', 0x1000, 0x2a, &(0x7f0000000280)=""/42, 0x41100, 0x0, '\x00', r5, 0x5, r7, 0x8, &(0x7f0000000380)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0xf, 0x400, 0x80000000}, 0x10, 0xffffffffffffffff, r9}, 0x78) 11:03:58 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fe00) 11:03:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005e) 11:03:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0xfffd, 0x0, 0x3}, 0x14) r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000000c0)=0x80) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r5, 0x0, 0x4}, 0xc) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r5, 0x1, 0x43}, 0xc) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x4) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r8, 0x0, 0x4}, 0xc) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000100)={r8, 0x6a, "38b4c5c49a7ff3784ddea5489b1c2a040b285f05e439274d823a111a7d77a2ff5f4304572521cf0fc0c2ac39ad7f35278afac21eee6a1f6bddd36d979562621893141316de3dbc7a67510027a0a549538028e6ff706a635c0fea95b97a7fd768f77948897b48d7c879c3"}, &(0x7f0000000180)=0x72) 11:03:58 executing program 2: getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x7, 0x101, 0xc732, 0x6, 0x81, 0x5, 0x9}, &(0x7f0000000180)=0x9c) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000002c0)={r0, @in={{0x2, 0x4e22, @multicast1}}}, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x14) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) dup2(r3, r3) fsetxattr$security_selinux(r3, &(0x7f0000000440), &(0x7f0000000480)='system_u:object_r:hugetlbfs_t:s0\x00', 0x21, 0x2) r4 = dup2(r2, r2) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) r8 = socket(0x11, 0x1, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r8, 0x84, 0x19, &(0x7f0000000400)={r7, 0x400}, 0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r7, 0x0, 0x4}, 0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000380)={r7, 0x3, 0x1, 0x1}, &(0x7f00000003c0)=0x10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0xc0182101, &(0x7f00000001c0)={r9}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0, 0x1ff}, 0x8) [ 741.972540][T26853] loop5: detected capacity change from 0 to 262160 [ 741.973582][T26854] loop0: detected capacity change from 0 to 262160 [ 741.990234][T26857] loop3: detected capacity change from 0 to 262160 [ 741.999221][T26858] loop1: detected capacity change from 0 to 262160 11:03:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008400) 11:03:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a5) 11:03:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005f) [ 742.095906][T26868] loop5: detected capacity change from 0 to 262160 11:03:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008500) 11:03:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a6) 11:03:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000060) [ 742.140893][T26872] loop1: detected capacity change from 0 to 262160 [ 742.152560][T26874] loop3: detected capacity change from 0 to 262160 11:03:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000ff00) [ 742.190900][T26880] loop5: detected capacity change from 0 to 262160 [ 742.200735][T26883] loop1: detected capacity change from 0 to 262160 [ 742.209459][T26885] loop3: detected capacity change from 0 to 262160 11:04:00 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r1 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000001c0)={r2}) sendmsg$AUDIT_TTY_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3f8, 0x100, 0x70bd25, 0x25dfdbfd, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x800) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14080080}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x100, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x240080c0}, 0x20000000) chdir(&(0x7f0000000140)='./file0\x00') r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f0000000540)={0x2, 0x1a3, "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"}) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000700)={0x68, r6, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, '^@$\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x10000884) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r7, 0x0, 0x80000001) 11:04:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a7) 11:04:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000061) 11:04:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008600) 11:04:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000ff7f) 11:04:00 executing program 2: setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x8, 0x40000}, 0x14) 11:04:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x3) 11:04:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x14) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0xfe, 0xff, 0x7fc00100}]}) r2 = dup2(r1, r1) sendto$inet(r0, &(0x7f0000000080)="67969245f04856bfcee759dc47542687cfb0284e6d9286fd39265534be186ab636f67c1d18716ad6c67288be2df7fca4ccb5657fe010bcccdf6f0e29b0d0e638950521c1208f623e5b2d883b0b", 0x4d, 0x80, &(0x7f0000000100)={0x2, 0x4e23, @private=0xa010101}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0xc0182101, &(0x7f00000001c0)={r3}) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) dup2(r4, r4) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r6 = dup2(r5, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0xc0182101, &(0x7f00000001c0)={r7}) r8 = accept4$inet(r2, 0x0, &(0x7f0000000180), 0x1800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000200)={r7, 0x2, r8, 0x1}) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000040), 0x4) [ 743.230725][T26901] loop5: detected capacity change from 0 to 262160 [ 743.235957][T26903] loop1: detected capacity change from 0 to 262160 [ 743.245490][T26904] loop3: detected capacity change from 0 to 262160 11:04:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008700) 11:04:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a8) 11:04:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000062) [ 743.373690][T26916] loop5: detected capacity change from 0 to 262160 [ 743.376965][T26919] loop1: detected capacity change from 0 to 262160 [ 743.381014][T26918] loop3: detected capacity change from 0 to 262160 [ 743.411056][T26920] loop0: detected capacity change from 0 to 262160 11:04:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000063) [ 743.423141][T26920] FAT-fs (loop0): Unrecognized mount option "" or missing value [ 743.485312][T26928] loop3: detected capacity change from 0 to 262160 11:04:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x0, 0x1, 0x2, 0x56, 0x0, 0x7ff, 0xa0000, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000400), 0x8}, 0x400, 0x73c, 0x9, 0x9, 0x80000001, 0x3, 0x7f, 0x0, 0x200, 0x0, 0x7d}, 0x0, 0x2, r0, 0x1) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x7, 0xd8, 0x1, 0x9, 0x0, 0x4, 0x4000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x22, 0x1b4a, 0x10001, 0x9, 0x9, 0x9, 0xfff8, 0x0, 0x80000001, 0x0, 0x3}, 0xffffffffffffffff, 0x6, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) creat(&(0x7f00000004c0)='./file1\x00', 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000180)='./bus/file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="9e64747d32a380112edf27ad29c9f7", 0xf, 0x7}], 0x14, &(0x7f0000000300)={[{@map_acorn}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}], [{@dont_measure}, {@obj_type}, {@appraise}, {@smackfsroot={'smackfsroot', 0x3d, '*#}\'.!\xb8/'}}]}) sendfile(r2, r3, 0x0, 0x80000001) 11:04:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008800) 11:04:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000a9) 11:04:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffffffffffffffff) 11:04:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000064) 11:04:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9b}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x400}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7fff}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040080}, 0x8001) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) r3 = dup2(r2, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0xc0182101, &(0x7f00000001c0)={r4}) sendmsg$nl_route(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv4_getnexthop={0x38, 0x6a, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NHA_OIF={0x8}, @NHA_FDB={0x4}, @NHA_ID={0x8}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x844) 11:04:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000aa) 11:04:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000065) 11:04:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80008900) [ 744.216451][T26936] loop3: detected capacity change from 0 to 262160 [ 744.218006][T26938] loop1: detected capacity change from 0 to 262160 [ 744.231133][T26941] loop5: detected capacity change from 0 to 262160 [ 744.249512][T26943] loop0: detected capacity change from 0 to 262160 11:04:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000280)) lchown(&(0x7f0000000180)='./file1\x00', r3, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x32, 0xbb, 0x100000000, 0x1}) 11:04:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00