63f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 257.936674][T13526] loop1: detected capacity change from 0 to 16383 [ 257.944730][T13527] loop2: detected capacity change from 0 to 16383 [ 257.960477][T13531] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 07:50:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef", 0x4, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 258.014465][T13536] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 258.026249][T13543] loop5: detected capacity change from 0 to 16383 [ 258.035691][T13544] loop0: detected capacity change from 0 to 7 [ 258.045739][T13545] loop4: detected capacity change from 0 to 16383 07:50:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d", 0xc0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 258.069361][T13555] loop1: detected capacity change from 0 to 16383 [ 258.070159][T13552] loop3: detected capacity change from 0 to 7 [ 258.085732][T13558] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 258.097694][T13562] loop2: detected capacity change from 0 to 16383 07:50:17 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) 07:50:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:17 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef", 0x4, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 258.139837][T13572] loop0: detected capacity change from 0 to 7 [ 258.167750][T13576] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 258.208987][T13583] loop4: detected capacity change from 0 to 16383 [ 258.235771][T13586] loop5: detected capacity change from 0 to 16383 [ 258.247044][T13588] loop1: detected capacity change from 0 to 16383 07:50:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:17 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) [ 258.254675][T13587] loop3: detected capacity change from 0 to 16383 07:50:17 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d", 0xc0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 258.298104][T13594] loop0: detected capacity change from 0 to 16383 07:50:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d", 0x5, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 258.380112][T13606] loop5: detected capacity change from 0 to 16383 [ 258.386871][T13605] loop4: detected capacity change from 0 to 16383 [ 258.411445][T13613] loop2: detected capacity change from 0 to 16383 07:50:17 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 258.425680][T13615] loop1: detected capacity change from 0 to 16383 [ 258.446384][T13619] loop3: detected capacity change from 0 to 16383 [ 258.453608][T13622] loop0: detected capacity change from 0 to 16383 07:50:18 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) 07:50:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d", 0x5, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c01", 0xce, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 258.551253][T13633] loop5: detected capacity change from 0 to 16383 [ 258.588663][T13643] loop1: detected capacity change from 0 to 16383 [ 258.589560][T13642] loop4: detected capacity change from 0 to 16383 07:50:18 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d", 0x5, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:18 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) [ 258.595830][T13644] loop2: detected capacity change from 0 to 16383 [ 258.610392][T13646] loop0: detected capacity change from 0 to 16383 [ 258.624653][T13649] loop3: detected capacity change from 0 to 16383 07:50:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c01", 0xce, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 258.687679][T13661] loop5: detected capacity change from 0 to 16383 [ 258.723508][T13670] loop1: detected capacity change from 0 to 16383 07:50:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {0x0, 0x0, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {0x0, 0x0, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 258.738056][T13672] loop4: detected capacity change from 0 to 16383 [ 258.760584][T13679] loop0: detected capacity change from 0 to 16383 [ 258.766197][T13681] loop2: detected capacity change from 0 to 16383 [ 258.775311][T13683] loop3: detected capacity change from 0 to 16383 07:50:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {0x0, 0x0, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) [ 258.817415][T13691] loop5: detected capacity change from 0 to 16383 07:50:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c01", 0xce, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {0x0, 0x0, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 258.905174][T13707] loop4: detected capacity change from 0 to 16383 [ 258.915448][T13712] loop0: detected capacity change from 0 to 16383 [ 258.925307][T13714] loop1: detected capacity change from 0 to 16383 [ 258.936983][T13715] loop3: detected capacity change from 0 to 16383 [ 258.942423][T13720] loop5: detected capacity change from 0 to 16383 07:50:18 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 258.947486][T13719] loop2: detected capacity change from 0 to 16383 07:50:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:18 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) 07:50:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {0x0, 0x0, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e", 0xd5, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {0x0, 0x0, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 259.025901][T13735] loop1: detected capacity change from 0 to 16383 07:50:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 259.067092][T13736] loop0: detected capacity change from 0 to 16383 [ 259.079134][T13745] loop4: detected capacity change from 0 to 16383 [ 259.087616][T13748] loop5: detected capacity change from 0 to 16383 [ 259.094326][T13749] loop3: detected capacity change from 0 to 16383 [ 259.094817][T13750] loop2: detected capacity change from 0 to 16383 07:50:18 executing program 4: socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) 07:50:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e", 0xd5, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 259.134969][T13759] loop1: detected capacity change from 0 to 16383 [ 259.165314][T13769] loop0: detected capacity change from 0 to 16383 07:50:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) 07:50:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 259.242515][T13779] loop4: detected capacity change from 0 to 16383 [ 259.248589][T13784] loop1: detected capacity change from 0 to 16383 [ 259.253669][T13785] loop3: detected capacity change from 0 to 16383 [ 259.268520][T13781] loop5: detected capacity change from 0 to 16383 [ 259.274268][T13792] loop0: detected capacity change from 0 to 16383 [ 259.275501][T13783] loop2: detected capacity change from 0 to 16383 07:50:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e", 0xd5, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 259.332599][T13799] loop4: detected capacity change from 0 to 16383 [ 259.359165][T13811] loop3: detected capacity change from 0 to 16383 07:50:18 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) 07:50:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 259.395577][T13812] loop1: detected capacity change from 0 to 16383 [ 259.397205][T13819] loop2: detected capacity change from 0 to 16383 [ 259.413430][T13825] loop5: detected capacity change from 0 to 16383 [ 259.432956][T13821] loop0: detected capacity change from 0 to 16383 07:50:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d", 0xd8, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:18 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) [ 259.454757][T13832] loop4: detected capacity change from 0 to 16383 07:50:19 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e", 0x13, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 259.516755][T13844] loop2: detected capacity change from 0 to 16383 [ 259.521822][T13847] loop3: detected capacity change from 0 to 16383 [ 259.523907][T13845] loop1: detected capacity change from 0 to 16383 [ 259.551716][T13853] loop4: detected capacity change from 0 to 16383 07:50:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d", 0xd8, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 259.575292][T13861] loop5: detected capacity change from 0 to 16383 [ 259.579978][T13862] loop0: detected capacity change from 0 to 16383 07:50:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e", 0x13, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) 07:50:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e", 0x13, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 259.655655][T13876] loop2: detected capacity change from 0 to 16383 [ 259.676675][T13880] loop3: detected capacity change from 0 to 16383 [ 259.689289][T13885] loop5: detected capacity change from 0 to 16383 [ 259.691230][T13884] loop4: detected capacity change from 0 to 16383 07:50:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d", 0xd8, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 259.709444][T13883] loop1: detected capacity change from 0 to 16383 [ 259.712824][T13889] loop0: detected capacity change from 0 to 16383 07:50:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e", 0x13, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) 07:50:19 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e", 0x13, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 259.806280][T13902] loop2: detected capacity change from 0 to 16383 [ 259.825719][T13911] loop4: detected capacity change from 0 to 16383 [ 259.844785][T13916] loop3: detected capacity change from 0 to 16383 07:50:19 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6", 0xda, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 259.851682][T13917] loop5: detected capacity change from 0 to 16383 [ 259.853003][T13918] loop1: detected capacity change from 0 to 16383 [ 259.865481][T13919] loop0: detected capacity change from 0 to 16383 07:50:19 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) 07:50:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e", 0x13, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 259.926472][T13934] loop2: detected capacity change from 0 to 16383 [ 259.936595][T13937] loop4: detected capacity change from 0 to 16383 [ 259.955596][T13930] loop5: detected capacity change from 0 to 16383 07:50:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6", 0xda, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d", 0x80, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) [ 259.998438][T13950] loop0: detected capacity change from 0 to 16383 [ 260.006500][T13952] loop3: detected capacity change from 0 to 16383 [ 260.012387][T13954] loop1: detected capacity change from 0 to 16383 07:50:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6", 0xda, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 260.055403][T13964] loop2: detected capacity change from 0 to 16383 [ 260.060403][T13965] loop4: detected capacity change from 0 to 16383 07:50:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x0, 0x0) 07:50:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 260.121218][T13976] loop5: detected capacity change from 0 to 16383 [ 260.143222][T13982] loop0: detected capacity change from 0 to 16383 [ 260.154725][T13987] loop2: detected capacity change from 0 to 16383 07:50:19 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d", 0x80, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07", 0x14, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 260.170845][T13985] loop3: detected capacity change from 0 to 16383 [ 260.173968][T13994] loop1: detected capacity change from 0 to 16383 [ 260.208872][T14002] loop5: detected capacity change from 0 to 16383 07:50:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x0, 0x0) 07:50:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 260.278586][T14014] loop0: detected capacity change from 0 to 16383 [ 260.286968][T14018] loop3: detected capacity change from 0 to 16383 [ 260.293319][T14019] loop2: detected capacity change from 0 to 16383 07:50:19 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d", 0x80, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 260.322373][T14029] loop1: detected capacity change from 0 to 16383 07:50:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07", 0x14, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:19 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x0, 0x0) 07:50:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 260.390944][T14041] loop3: detected capacity change from 0 to 16383 [ 260.408762][T14040] loop5: detected capacity change from 0 to 16383 07:50:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f12565", 0xa0, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 260.459343][T14059] loop2: detected capacity change from 0 to 16383 [ 260.480442][T14053] loop1: detected capacity change from 0 to 16383 [ 260.490204][T14060] loop0: detected capacity change from 0 to 16383 07:50:20 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}]) 07:50:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 260.553291][T14075] loop4: detected capacity change from 0 to 7 [ 260.557929][T14073] loop3: detected capacity change from 0 to 16383 [ 260.569796][T14076] loop5: detected capacity change from 0 to 16383 [ 260.586277][T14079] loop2: detected capacity change from 0 to 16383 07:50:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07", 0x14, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 260.619179][T14089] loop1: detected capacity change from 0 to 16383 07:50:20 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}]) 07:50:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:20 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f12565", 0xa0, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 260.699696][T14097] loop0: detected capacity change from 0 to 16383 [ 260.702583][T14101] loop4: detected capacity change from 0 to 7 [ 260.735692][T14100] loop2: detected capacity change from 0 to 16383 [ 260.737766][T14113] loop1: detected capacity change from 0 to 16383 07:50:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a", 0x81, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 260.758341][T14118] loop5: detected capacity change from 0 to 16383 [ 260.765675][T14119] loop3: detected capacity change from 0 to 16383 07:50:20 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}]) 07:50:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face", 0x19, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87", 0x22, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 260.843559][T14127] loop4: detected capacity change from 0 to 7 [ 260.860927][T14125] loop5: detected capacity change from 0 to 16383 07:50:20 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a", 0x81, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 260.903749][T14140] loop1: detected capacity change from 0 to 16383 [ 260.916437][T14141] loop3: detected capacity change from 0 to 16383 [ 260.937355][T14142] loop2: detected capacity change from 0 to 16383 [ 260.945296][T14143] loop0: detected capacity change from 0 to 16383 07:50:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:20 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}]) 07:50:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d873176", 0x24, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 260.992525][T14153] loop5: detected capacity change from 0 to 16383 07:50:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face", 0x19, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 261.056020][T14165] loop4: detected capacity change from 0 to 16383 [ 261.073089][T14166] loop1: detected capacity change from 0 to 16383 [ 261.081001][T14169] loop3: detected capacity change from 0 to 16383 07:50:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 261.103386][T14174] loop2: detected capacity change from 0 to 16383 [ 261.116644][T14177] loop0: detected capacity change from 0 to 16383 07:50:20 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a", 0x81, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0}]) 07:50:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face", 0x19, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d873176", 0x24, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 261.238458][T14185] loop1: detected capacity change from 0 to 16383 [ 261.242267][T14196] loop4: detected capacity change from 0 to 7 [ 261.256205][T14193] loop5: detected capacity change from 0 to 16383 [ 261.257052][T14197] loop0: detected capacity change from 0 to 16383 [ 261.265841][T14198] loop2: detected capacity change from 0 to 16383 07:50:20 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {0x0}]) 07:50:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 261.290038][T14204] loop3: detected capacity change from 0 to 16383 07:50:20 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec", 0x91, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d873176", 0x24, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 261.360230][T14216] loop1: detected capacity change from 0 to 16383 07:50:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368", 0x1b, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 261.412510][T14230] loop5: detected capacity change from 0 to 16383 [ 261.422973][T14231] loop2: detected capacity change from 0 to 16383 [ 261.425733][T14229] loop3: detected capacity change from 0 to 16383 07:50:20 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {0x0}]) 07:50:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637", 0x25, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 261.484466][T14243] loop1: detected capacity change from 0 to 16383 [ 261.497102][T14246] loop0: detected capacity change from 0 to 16383 07:50:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368", 0x1b, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:21 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {0x0}]) [ 261.596688][T14260] loop5: detected capacity change from 0 to 16383 [ 261.601856][T14263] loop2: detected capacity change from 0 to 16383 07:50:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d", 0x73, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 261.637316][T14262] loop3: detected capacity change from 0 to 16383 [ 261.644176][T14270] loop1: detected capacity change from 0 to 16383 [ 261.652559][T14271] loop0: detected capacity change from 0 to 16383 07:50:21 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0}]) 07:50:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368", 0x1b, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637", 0x25, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 261.747245][T14285] loop2: detected capacity change from 0 to 16383 [ 261.755654][T14287] loop5: detected capacity change from 0 to 16383 [ 261.762954][T14289] loop0: detected capacity change from 0 to 16383 07:50:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d", 0x73, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face136899", 0x1c, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 261.787983][T14303] loop1: detected capacity change from 0 to 16383 [ 261.805671][T14305] loop3: detected capacity change from 0 to 16383 07:50:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:21 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0}]) [ 261.878626][T14320] loop5: detected capacity change from 0 to 16383 [ 261.902203][T14321] loop0: detected capacity change from 0 to 16383 [ 261.903322][T14326] loop2: detected capacity change from 0 to 16383 07:50:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637", 0x25, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d", 0x73, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 261.938400][T14331] loop1: detected capacity change from 0 to 16383 07:50:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face136899", 0x1c, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 261.992783][T14342] loop3: detected capacity change from 0 to 16383 [ 262.005054][T14347] loop5: detected capacity change from 0 to 16383 07:50:21 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0}]) 07:50:21 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418", 0x7b, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 262.063580][T14355] loop0: detected capacity change from 0 to 16383 [ 262.080193][T14361] loop1: detected capacity change from 0 to 16383 [ 262.096650][T14360] loop2: detected capacity change from 0 to 16383 07:50:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face136899", 0x1c, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 262.123344][T14376] loop5: detected capacity change from 0 to 16383 07:50:21 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {0x0}]) 07:50:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418", 0x7b, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 262.207208][T14390] loop0: detected capacity change from 0 to 16383 [ 262.237790][T14389] loop1: detected capacity change from 0 to 16383 07:50:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 262.265382][T14402] loop2: detected capacity change from 0 to 16383 [ 262.273520][T14405] loop5: detected capacity change from 0 to 16383 07:50:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {0x0}]) 07:50:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418", 0x7b, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d", 0xf7, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 262.411365][T14436] loop2: detected capacity change from 0 to 16383 [ 262.417466][T14438] loop1: detected capacity change from 0 to 16383 [ 262.420093][T14439] loop5: detected capacity change from 0 to 16383 07:50:21 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {0x0}]) 07:50:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d", 0xf7, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:22 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {0x0}]) [ 262.508802][T14459] __nla_validate_parse: 55 callbacks suppressed [ 262.508813][T14459] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 262.523889][T14463] loop3: detected capacity change from 0 to 16383 [ 262.525357][T14461] loop2: detected capacity change from 0 to 16383 07:50:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 262.581064][T14472] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 262.614891][T14477] loop5: detected capacity change from 0 to 16383 07:50:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 262.629056][T14485] loop1: detected capacity change from 0 to 16383 [ 262.650169][T14492] loop3: detected capacity change from 0 to 16383 [ 262.653781][T14493] loop2: detected capacity change from 0 to 16383 07:50:22 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {0x0}]) 07:50:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d", 0xf7, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 262.680437][T14498] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 262.716190][T14503] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:50:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 262.754164][T14514] loop5: detected capacity change from 0 to 16383 [ 262.762785][T14515] loop0: detected capacity change from 0 to 16383 [ 262.779825][T14519] loop1: detected capacity change from 0 to 16383 07:50:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 262.803711][T14522] loop3: detected capacity change from 0 to 16383 [ 262.814676][T14527] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 07:50:22 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {0x0}]) 07:50:22 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 262.901245][T14532] loop2: detected capacity change from 0 to 16383 [ 262.933311][T14540] loop0: detected capacity change from 0 to 16383 07:50:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfb, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:22 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)}, {0x0}]) [ 262.955284][T14546] loop3: detected capacity change from 0 to 16383 [ 262.971324][T14550] loop5: detected capacity change from 0 to 16383 [ 262.974414][T14548] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 262.986978][T14551] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 07:50:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 263.012542][T14552] loop1: detected capacity change from 0 to 16383 07:50:22 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000018c0)}, {0x0}]) 07:50:22 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a", 0x81, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b", 0xfb, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 263.060356][T14569] loop2: detected capacity change from 0 to 16383 [ 263.065456][T14571] loop3: detected capacity change from 0 to 16383 [ 263.100117][T14569] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 263.129861][T14581] loop0: detected capacity change from 0 to 16383 07:50:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 263.173485][T14588] loop1: detected capacity change from 0 to 16383 [ 263.185862][T14592] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 263.202543][T14589] loop5: detected capacity change from 0 to 16383 07:50:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 263.219484][T14597] loop2: detected capacity change from 0 to 16383 07:50:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfb, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:22 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000018c0)}, {0x0}]) 07:50:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 263.250655][T14603] loop3: detected capacity change from 0 to 16383 [ 263.271583][T14608] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 263.281565][T14609] loop0: detected capacity change from 0 to 16383 07:50:22 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a", 0x81, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{0x0}, {0x0}]) [ 263.341866][T14617] loop1: detected capacity change from 0 to 16383 [ 263.366594][T14624] loop2: detected capacity change from 0 to 16383 [ 263.379653][T14630] loop5: detected capacity change from 0 to 16383 07:50:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a3", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:22 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a", 0x81, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 263.429132][T14637] loop0: detected capacity change from 0 to 16383 [ 263.448791][T14643] loop3: detected capacity change from 0 to 16383 07:50:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:23 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{0x0}, {0x0}]) [ 263.488012][T14652] loop1: detected capacity change from 0 to 16383 [ 263.519523][T14657] loop2: detected capacity change from 0 to 16383 [ 263.527222][T14662] loop0: detected capacity change from 0 to 16383 07:50:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 263.566516][T14666] loop5: detected capacity change from 0 to 16383 [ 263.584443][T14678] loop3: detected capacity change from 0 to 16383 [ 263.601305][T14682] loop1: detected capacity change from 0 to 16383 07:50:23 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 4: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{0x0}, {0x0}]) 07:50:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a3", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) [ 263.713129][T14697] loop0: detected capacity change from 0 to 16383 [ 263.740257][T14701] loop2: detected capacity change from 0 to 16383 [ 263.749466][T14705] loop5: detected capacity change from 0 to 16383 07:50:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 263.773848][T14711] loop3: detected capacity change from 0 to 16383 [ 263.785637][T14714] loop1: detected capacity change from 0 to 16383 07:50:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 263.840461][T14723] loop4: detected capacity change from 0 to 16383 [ 263.870739][T14726] loop2: detected capacity change from 0 to 16383 07:50:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 263.905669][T14739] loop1: detected capacity change from 0 to 16383 [ 263.921971][T14741] loop0: detected capacity change from 0 to 16383 [ 263.924863][T14742] loop3: detected capacity change from 0 to 16383 [ 263.936557][T14745] loop5: detected capacity change from 0 to 16383 07:50:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 263.962296][T14750] loop4: detected capacity change from 0 to 16383 07:50:23 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0), 0x0, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 264.049725][T14760] loop3: detected capacity change from 0 to 16383 [ 264.071389][T14769] loop2: detected capacity change from 0 to 16383 [ 264.089482][T14774] loop1: detected capacity change from 0 to 16383 07:50:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 264.098371][T14779] loop0: detected capacity change from 0 to 16383 [ 264.098762][T14776] loop5: detected capacity change from 0 to 16383 [ 264.109770][T14778] loop4: detected capacity change from 0 to 16383 07:50:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)}]) 07:50:23 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r2, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r3, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) 07:50:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 264.188597][T14792] loop3: detected capacity change from 0 to 16383 [ 264.203177][T14793] loop2: detected capacity change from 0 to 16383 [ 264.213239][T14795] loop0: detected capacity change from 0 to 16383 07:50:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r2, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) [ 264.273463][T14810] loop1: detected capacity change from 0 to 16383 [ 264.280572][T14809] loop4: detected capacity change from 0 to 16383 [ 264.283822][T14811] loop5: detected capacity change from 0 to 16383 07:50:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 264.369146][T14822] loop4: detected capacity change from 0 to 16383 [ 264.387729][T14823] loop3: detected capacity change from 0 to 16383 [ 264.391232][T14826] loop0: detected capacity change from 0 to 16383 [ 264.405021][T14834] loop1: detected capacity change from 0 to 16383 [ 264.412775][T14833] loop2: detected capacity change from 0 to 16383 07:50:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75", 0x6, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 264.413911][T14835] loop5: detected capacity change from 0 to 16383 07:50:23 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r1, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:24 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 264.523982][T14855] loop2: detected capacity change from 0 to 16383 07:50:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 264.564115][T14857] loop0: detected capacity change from 0 to 16383 [ 264.570360][T14864] loop1: detected capacity change from 0 to 16383 [ 264.580433][T14856] loop4: detected capacity change from 0 to 16383 [ 264.588535][T14867] loop5: detected capacity change from 0 to 16383 [ 264.598005][T14865] loop3: detected capacity change from 0 to 16383 07:50:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 264.627584][T14880] loop2: detected capacity change from 0 to 16383 07:50:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, 0x0, 0x20040880) 07:50:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) [ 264.729608][T14890] loop3: detected capacity change from 0 to 16383 [ 264.747816][T14901] loop1: detected capacity change from 0 to 16383 [ 264.748963][T14899] loop0: detected capacity change from 0 to 16383 [ 264.767008][T14900] loop5: detected capacity change from 0 to 16383 [ 264.767601][T14902] loop2: detected capacity change from 0 to 16383 07:50:24 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, 0x0, 0x20040880) 07:50:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 264.778527][T14908] loop4: detected capacity change from 0 to 16383 07:50:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r3, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) 07:50:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) [ 264.871048][T14921] loop1: detected capacity change from 0 to 16383 [ 264.887231][T14923] loop5: detected capacity change from 0 to 16383 [ 264.896800][T14922] loop3: detected capacity change from 0 to 16383 [ 264.904520][T14924] loop0: detected capacity change from 0 to 16383 07:50:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r3, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, 0x0, 0x20040880) 07:50:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 264.926256][T14938] loop4: detected capacity change from 0 to 16383 [ 264.933722][T14937] loop2: detected capacity change from 0 to 16383 07:50:24 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) [ 265.000207][T14944] loop1: detected capacity change from 0 to 16383 07:50:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 265.043139][T14956] loop3: detected capacity change from 0 to 16383 [ 265.083195][T14963] loop5: detected capacity change from 0 to 16383 07:50:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r1, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r2, 0xe71, 0x5, 0x1}) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) [ 265.085606][T14965] loop2: detected capacity change from 0 to 16383 [ 265.097399][T14967] loop4: detected capacity change from 0 to 16383 [ 265.106606][T14964] loop0: detected capacity change from 0 to 16383 [ 265.118108][T14975] loop1: detected capacity change from 0 to 16383 07:50:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 265.177162][T14983] loop3: detected capacity change from 0 to 16383 07:50:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r1, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 265.246974][T14996] loop4: detected capacity change from 0 to 16383 [ 265.260203][T14999] loop2: detected capacity change from 0 to 16383 [ 265.273199][T15002] loop1: detected capacity change from 0 to 16383 [ 265.277155][T15003] loop5: detected capacity change from 0 to 16383 07:50:24 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:24 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 265.292204][T14998] loop0: detected capacity change from 0 to 16383 [ 265.295908][T15008] loop3: detected capacity change from 0 to 16383 07:50:24 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 265.395354][T15033] loop0: detected capacity change from 0 to 16383 [ 265.418006][T15038] loop1: detected capacity change from 0 to 16383 [ 265.427026][T15037] loop4: detected capacity change from 0 to 16383 [ 265.437488][T15039] loop5: detected capacity change from 0 to 16383 07:50:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:24 executing program 4: socket$netlink(0x10, 0x3, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 265.442599][T15044] loop2: detected capacity change from 0 to 16383 [ 265.450267][T15047] loop3: detected capacity change from 0 to 16383 07:50:24 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 265.549502][T15057] loop2: detected capacity change from 0 to 16383 [ 265.555066][T15060] loop0: detected capacity change from 0 to 16383 [ 265.570245][T15061] loop4: detected capacity change from 0 to 16383 [ 265.572045][T15070] loop1: detected capacity change from 0 to 16383 [ 265.589081][T15073] loop5: detected capacity change from 0 to 16383 07:50:25 executing program 4: socket$netlink(0x10, 0x3, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 265.624023][T15080] loop3: detected capacity change from 0 to 16383 07:50:25 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 265.686279][T15090] loop4: detected capacity change from 0 to 16383 [ 265.705717][T15089] loop2: detected capacity change from 0 to 16383 07:50:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 4: socket$netlink(0x10, 0x3, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) [ 265.741297][T15103] loop3: detected capacity change from 0 to 16383 [ 265.748667][T15102] loop5: detected capacity change from 0 to 16383 [ 265.755416][T15106] loop1: detected capacity change from 0 to 16383 [ 265.764693][T15108] loop0: detected capacity change from 0 to 16383 07:50:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 265.826009][T15118] loop2: detected capacity change from 0 to 16383 [ 265.831916][T15121] loop4: detected capacity change from 0 to 16383 07:50:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) [ 265.886564][T15133] loop3: detected capacity change from 0 to 16383 [ 265.901467][T15136] loop5: detected capacity change from 0 to 16383 07:50:25 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 265.932077][T15137] loop1: detected capacity change from 0 to 16383 [ 265.941374][T15138] loop0: detected capacity change from 0 to 16383 [ 265.949604][T15149] loop4: detected capacity change from 0 to 16383 [ 265.950420][T15150] loop2: detected capacity change from 0 to 16383 07:50:25 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 266.017698][T15161] loop3: detected capacity change from 0 to 16383 [ 266.018455][T15162] loop5: detected capacity change from 0 to 16383 07:50:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 266.079931][T15175] loop1: detected capacity change from 0 to 16383 [ 266.087561][T15176] loop4: detected capacity change from 0 to 16383 [ 266.089943][T15178] loop2: detected capacity change from 0 to 16383 07:50:25 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 266.149692][T15191] loop5: detected capacity change from 0 to 16383 [ 266.171544][T15194] loop3: detected capacity change from 0 to 16383 [ 266.184243][T15192] loop0: detected capacity change from 0 to 16383 07:50:25 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:25 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x0, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) [ 266.209445][T15204] loop4: detected capacity change from 0 to 16383 [ 266.217994][T15208] loop1: detected capacity change from 0 to 16383 [ 266.229655][T15206] loop2: detected capacity change from 0 to 16383 07:50:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 266.339316][T15216] loop5: detected capacity change from 0 to 16383 [ 266.348076][T15229] loop4: detected capacity change from 0 to 16383 [ 266.351801][T15231] loop3: detected capacity change from 0 to 16383 [ 266.357969][T15230] loop1: detected capacity change from 0 to 16383 [ 266.372218][T15235] loop0: detected capacity change from 0 to 16383 07:50:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 266.388144][T15234] loop2: detected capacity change from 0 to 16383 07:50:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:25 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={0x0}}, 0x20040880) 07:50:25 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x0, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) [ 266.492896][T15254] loop0: detected capacity change from 0 to 16383 [ 266.500182][T15256] loop5: detected capacity change from 0 to 16383 [ 266.514348][T15252] loop3: detected capacity change from 0 to 16383 [ 266.529157][T15262] loop1: detected capacity change from 0 to 16383 07:50:26 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 266.538474][T15266] loop4: detected capacity change from 0 to 16383 [ 266.548510][T15264] loop2: detected capacity change from 0 to 16383 07:50:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={0x0}}, 0x20040880) 07:50:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x0, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 266.642338][T15285] loop5: detected capacity change from 0 to 16383 [ 266.654498][T15286] loop1: detected capacity change from 0 to 16383 [ 266.677619][T15292] loop0: detected capacity change from 0 to 16383 [ 266.685170][T15290] loop3: detected capacity change from 0 to 16383 07:50:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 266.688045][T15294] loop2: detected capacity change from 0 to 16383 [ 266.699401][T15293] loop4: detected capacity change from 0 to 16383 07:50:26 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:26 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x0, 0x0) 07:50:26 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={0x0}}, 0x20040880) 07:50:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x91}, 0x0) [ 266.809147][T15314] loop5: detected capacity change from 0 to 16383 [ 266.820921][T15315] loop3: detected capacity change from 0 to 16383 [ 266.828798][T15316] loop2: detected capacity change from 0 to 16383 [ 266.836581][T15321] loop1: detected capacity change from 0 to 16383 [ 266.849741][T15324] loop0: detected capacity change from 0 to 16383 07:50:26 executing program 1: socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x0, 0x0) 07:50:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 266.939366][T15334] loop5: detected capacity change from 0 to 16383 07:50:26 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x91}, 0x0) [ 266.984864][T15345] loop0: detected capacity change from 0 to 16383 [ 267.000312][T15353] loop2: detected capacity change from 0 to 16383 [ 267.003578][T15354] loop3: detected capacity change from 0 to 16383 [ 267.014726][T15350] loop1: detected capacity change from 0 to 16383 07:50:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x0, 0x0) 07:50:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{0x0, 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 267.080225][T15368] loop5: detected capacity change from 0 to 16383 07:50:26 executing program 1: socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:26 executing program 5: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d", 0x82, 0x8}, {&(0x7f0000001900), 0x0, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf", 0xc}]) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x91}, 0x0) [ 267.157165][T15381] loop0: detected capacity change from 0 to 16383 [ 267.168907][T15384] loop2: detected capacity change from 0 to 16383 [ 267.176091][T15382] loop3: detected capacity change from 0 to 16383 [ 267.178876][T15389] loop1: detected capacity change from 0 to 16383 07:50:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}]) [ 267.211383][T15396] loop5: detected capacity change from 0 to 16383 07:50:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d", 0xf7, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 267.270486][T15407] loop0: detected capacity change from 0 to 16383 [ 267.273419][T15409] loop4: detected capacity change from 0 to 16383 [ 267.302440][T15415] loop3: detected capacity change from 0 to 16383 07:50:26 executing program 1: socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:26 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:26 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}]) 07:50:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 267.326055][T15421] loop2: detected capacity change from 0 to 16383 [ 267.341251][T15426] loop1: detected capacity change from 0 to 16383 [ 267.350650][T15429] loop5: detected capacity change from 0 to 16383 07:50:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d", 0xf7, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:26 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 267.410408][T15438] loop4: detected capacity change from 0 to 16383 [ 267.441002][T15446] loop1: detected capacity change from 0 to 16383 07:50:27 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}]) [ 267.462165][T15448] loop3: detected capacity change from 0 to 16383 [ 267.476712][T15456] loop5: detected capacity change from 0 to 16383 [ 267.484556][T15453] loop0: detected capacity change from 0 to 16383 [ 267.488219][T15458] loop2: detected capacity change from 0 to 16383 07:50:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 267.530466][T15466] loop4: detected capacity change from 0 to 16383 [ 267.539543][T15467] __nla_validate_parse: 57 callbacks suppressed [ 267.539558][T15467] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 267.564892][T15470] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 267.578648][T15475] loop3: detected capacity change from 0 to 16383 07:50:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d", 0xf7, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 267.609614][T15481] loop1: detected capacity change from 0 to 16383 [ 267.635956][T15488] loop2: detected capacity change from 0 to 16383 07:50:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:27 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x7}]) 07:50:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 267.658688][T15491] loop0: detected capacity change from 0 to 16383 07:50:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfb, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 267.686211][T15498] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 267.687867][T15494] loop5: detected capacity change from 0 to 16383 [ 267.702542][T15497] loop4: detected capacity change from 0 to 16383 [ 267.709742][T15502] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 07:50:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x7}]) [ 267.743664][T15507] loop1: detected capacity change from 0 to 16383 [ 267.752205][T15505] loop3: detected capacity change from 0 to 16383 07:50:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 267.800147][T15517] loop0: detected capacity change from 0 to 16383 [ 267.814129][T15518] loop2: detected capacity change from 0 to 16383 07:50:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0), 0x0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfb, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 267.855390][T15518] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 267.867526][T15522] loop3: detected capacity change from 0 to 16383 [ 267.879843][T15531] loop1: detected capacity change from 0 to 16383 [ 267.890770][T15517] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 07:50:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 267.931048][T15532] loop4: detected capacity change from 0 to 16383 [ 267.980658][T15547] loop2: detected capacity change from 0 to 16383 [ 267.988857][T15544] loop5: detected capacity change from 0 to 16383 [ 267.997335][T15549] loop0: detected capacity change from 0 to 16383 [ 268.019013][T15554] loop3: detected capacity change from 0 to 16383 07:50:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfb, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x7}]) [ 268.033738][T15547] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 268.043902][T15558] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 268.053151][T15560] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 268.058347][T15559] loop1: detected capacity change from 0 to 16383 07:50:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b387", 0x7f, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 268.110281][T15571] loop4: detected capacity change from 0 to 16383 [ 268.147126][T15572] loop2: detected capacity change from 0 to 16383 07:50:27 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40), 0x0, 0x7}]) [ 268.175750][T15582] loop0: detected capacity change from 0 to 16383 [ 268.192807][T15583] loop3: detected capacity change from 0 to 16383 [ 268.202308][T15572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 268.204519][T15587] loop1: detected capacity change from 0 to 16383 07:50:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 268.230051][T15591] loop5: detected capacity change from 0 to 16383 [ 268.246401][T15595] loop4: detected capacity change from 0 to 16383 07:50:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40), 0x0, 0x7}]) 07:50:27 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfb, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 268.320290][T15605] loop2: detected capacity change from 0 to 16383 [ 268.352031][T15609] loop0: detected capacity change from 0 to 16383 [ 268.359285][T15608] loop4: detected capacity change from 0 to 16383 07:50:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 268.385138][T15624] loop3: detected capacity change from 0 to 16383 [ 268.390749][T15626] loop5: detected capacity change from 0 to 16383 [ 268.420842][T15627] loop1: detected capacity change from 0 to 16383 07:50:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:27 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40), 0x0, 0x7}]) [ 268.440432][T15633] loop2: detected capacity change from 0 to 16383 [ 268.473254][T15639] loop0: detected capacity change from 0 to 16383 07:50:28 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 268.489036][T15649] loop4: detected capacity change from 0 to 16383 [ 268.497336][T15643] loop3: detected capacity change from 0 to 16383 07:50:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4", 0xbf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfb, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b6", 0xe0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb", 0x10, 0x7}]) [ 268.595367][T15664] loop1: detected capacity change from 0 to 16383 [ 268.600641][T15660] loop2: detected capacity change from 0 to 16383 [ 268.614708][T15670] loop5: detected capacity change from 0 to 16383 [ 268.630354][T15666] loop0: detected capacity change from 0 to 16383 07:50:28 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfc, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 268.663334][T15676] loop3: detected capacity change from 0 to 16383 [ 268.692141][T15683] loop4: detected capacity change from 0 to 16383 07:50:28 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb", 0x10, 0x7}]) [ 268.719184][T15693] loop2: detected capacity change from 0 to 16383 [ 268.730323][T15695] loop1: detected capacity change from 0 to 16383 07:50:28 executing program 5: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}]) 07:50:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b6", 0xe0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000), 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 268.768386][T15704] loop4: detected capacity change from 0 to 16383 [ 268.784925][T15708] loop5: detected capacity change from 0 to 16383 07:50:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfc, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 268.813243][T15711] loop3: detected capacity change from 0 to 16383 [ 268.837646][T15717] loop0: detected capacity change from 0 to 16383 [ 268.846813][T15720] loop2: detected capacity change from 0 to 16383 07:50:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b6", 0xe0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb", 0x10, 0x7}]) [ 268.858448][T15718] loop1: detected capacity change from 0 to 16383 07:50:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b6", 0xe0, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 268.891148][T15727] loop4: detected capacity change from 0 to 16383 [ 268.912541][T15736] loop5: detected capacity change from 0 to 16383 [ 268.930544][T15737] loop3: detected capacity change from 0 to 16383 07:50:28 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03", 0x18, 0x7}]) 07:50:28 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000), 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 268.936568][T15742] loop0: detected capacity change from 0 to 16383 07:50:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfc, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535", 0xe8, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 268.972401][T15750] loop4: detected capacity change from 0 to 16383 [ 268.979394][T15752] loop1: detected capacity change from 0 to 16383 07:50:28 executing program 5: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb", 0x10, 0x7}]) 07:50:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94", 0xdf, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03", 0x18, 0x7}]) [ 269.017630][T15762] loop2: detected capacity change from 0 to 16383 [ 269.042879][T15767] loop5: detected capacity change from 0 to 16383 [ 269.046489][T15769] loop3: detected capacity change from 0 to 16383 [ 269.053707][T15770] loop0: detected capacity change from 0 to 16383 07:50:28 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000), 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r1, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r2, 0xe71, 0x5, 0x1}) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a3", 0xfd}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 269.076650][T15779] loop4: detected capacity change from 0 to 16383 [ 269.086468][T15782] loop1: detected capacity change from 0 to 16383 07:50:28 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03", 0x18, 0x7}]) 07:50:28 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535", 0xe8, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 269.122313][T15788] loop2: detected capacity change from 0 to 16383 [ 269.159068][T15797] loop5: detected capacity change from 0 to 16383 07:50:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 269.198481][T15804] loop0: detected capacity change from 0 to 16383 [ 269.206552][T15808] loop4: detected capacity change from 0 to 16383 [ 269.215583][T15807] loop1: detected capacity change from 0 to 16383 [ 269.234811][T15813] loop3: detected capacity change from 0 to 16383 07:50:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r1, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r2, 0xe71, 0x5, 0x1}) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 269.244452][T15817] loop2: detected capacity change from 0 to 16383 07:50:28 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e", 0x1c, 0x7}]) 07:50:28 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535", 0xe8, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 269.278368][T15824] loop5: detected capacity change from 0 to 16383 07:50:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000), 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 269.345518][T15838] loop3: detected capacity change from 0 to 16383 [ 269.361627][T15839] loop1: detected capacity change from 0 to 16383 [ 269.361914][T15842] loop0: detected capacity change from 0 to 16383 [ 269.375375][T15843] loop4: detected capacity change from 0 to 16383 [ 269.392767][T15851] loop2: detected capacity change from 0 to 16383 [ 269.397985][T15853] loop5: detected capacity change from 0 to 16383 07:50:28 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a3", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:28 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000), 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467", 0xec, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e", 0x1c, 0x7}]) [ 269.466894][T15862] loop1: detected capacity change from 0 to 16383 07:50:29 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 269.532019][T15874] loop0: detected capacity change from 0 to 16383 [ 269.534863][T15879] loop3: detected capacity change from 0 to 16383 [ 269.545323][T15880] loop4: detected capacity change from 0 to 16383 [ 269.551992][T15873] loop2: detected capacity change from 0 to 16383 [ 269.559792][T15876] loop5: detected capacity change from 0 to 16383 07:50:29 executing program 5: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e", 0x1c, 0x7}]) 07:50:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467", 0xec, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e", 0x1c, 0x7}]) [ 269.602577][T15893] loop1: detected capacity change from 0 to 16383 07:50:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d", 0xf7, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 269.657567][T15900] loop2: detected capacity change from 0 to 16383 [ 269.667851][T15905] loop0: detected capacity change from 0 to 16383 [ 269.678560][T15903] loop5: detected capacity change from 0 to 16383 [ 269.691712][T15913] loop3: detected capacity change from 0 to 16383 [ 269.698237][T15915] loop4: detected capacity change from 0 to 16383 07:50:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d", 0xf7, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 269.739623][T15922] loop1: detected capacity change from 0 to 16383 [ 269.753197][T15926] loop5: detected capacity change from 0 to 16383 [ 269.767718][T15932] loop2: detected capacity change from 0 to 16383 07:50:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, 0x0, &(0x7f0000001cc0), 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc4", 0x1e, 0x7}]) 07:50:29 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467", 0xec, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 269.834527][T15941] loop0: detected capacity change from 0 to 16383 [ 269.855483][T15944] loop2: detected capacity change from 0 to 16383 [ 269.857022][T15947] loop4: detected capacity change from 0 to 16383 [ 269.862477][T15942] loop5: detected capacity change from 0 to 16383 07:50:29 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc4", 0x1e, 0x7}]) 07:50:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d", 0xf7, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 269.880236][T15953] loop1: detected capacity change from 0 to 16383 [ 269.890397][T15958] loop3: detected capacity change from 0 to 16383 [ 269.929845][T15967] loop0: detected capacity change from 0 to 16383 07:50:29 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) 07:50:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfb, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, 0x0, &(0x7f0000001cc0), 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de41", 0xee, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 270.029489][T15979] loop4: detected capacity change from 0 to 16383 [ 270.034582][T15987] loop2: detected capacity change from 0 to 16383 [ 270.036920][T15984] loop1: detected capacity change from 0 to 16383 [ 270.050374][T15990] loop5: detected capacity change from 0 to 16383 [ 270.057026][T15988] loop3: detected capacity change from 0 to 16383 [ 270.070879][T15991] loop0: detected capacity change from 0 to 16383 07:50:29 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc4", 0x1e, 0x7}]) 07:50:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) 07:50:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfb, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de41", 0xee, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, 0x0, &(0x7f0000001cc0), 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 270.156587][T16003] loop4: detected capacity change from 0 to 16383 [ 270.157765][T16002] loop1: detected capacity change from 0 to 16383 [ 270.192371][T16014] loop0: detected capacity change from 0 to 16383 07:50:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfb, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470", 0x1f, 0x7}]) 07:50:29 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) [ 270.216694][T16020] loop3: detected capacity change from 0 to 16383 [ 270.222803][T16023] loop2: detected capacity change from 0 to 16383 [ 270.230479][T16018] loop5: detected capacity change from 0 to 16383 07:50:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, 0x0, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de41", 0xee, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r3, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r2, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) [ 270.297136][T16033] loop4: detected capacity change from 0 to 16383 [ 270.312132][T16034] loop1: detected capacity change from 0 to 16383 07:50:29 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470", 0x1f, 0x7}]) 07:50:29 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x0, 0x0) [ 270.348715][T16039] loop0: detected capacity change from 0 to 16383 [ 270.353543][T16044] loop2: detected capacity change from 0 to 16383 [ 270.365709][T16045] loop3: detected capacity change from 0 to 16383 [ 270.378654][T16048] loop5: detected capacity change from 0 to 16383 07:50:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r3, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab2", 0x9, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r2, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:29 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x0, 0x0) [ 270.401269][T16056] loop4: detected capacity change from 0 to 16383 07:50:29 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470", 0x1f, 0x7}]) 07:50:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, 0x0, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20}]) 07:50:30 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x0, 0x0) [ 270.498431][T16078] loop5: detected capacity change from 0 to 16383 [ 270.505652][T16080] loop4: detected capacity change from 0 to 16383 [ 270.509106][T16079] loop2: detected capacity change from 0 to 16383 [ 270.513664][T16081] loop0: detected capacity change from 0 to 16383 [ 270.526942][T16085] loop3: detected capacity change from 0 to 16383 07:50:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r3, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) accept4$unix(r2, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, 0x0, 0x80000) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x1, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}]) 07:50:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r3, 0xe71, 0x5, 0x1}) accept4$unix(r2, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) accept4$unix(r2, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) [ 270.641151][T16111] loop0: detected capacity change from 0 to 16383 [ 270.661738][T16109] loop4: detected capacity change from 0 to 16383 [ 270.670543][T16117] loop3: detected capacity change from 0 to 16383 [ 270.679095][T16113] loop2: detected capacity change from 0 to 16383 07:50:30 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20}]) 07:50:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) accept4$unix(r1, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfc, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 270.775191][T16133] loop4: detected capacity change from 0 to 16383 [ 270.821969][T16133] ================================================================== [ 270.830068][T16133] BUG: KCSAN: data-race in generic_fillattr / shmem_getpage_gfp [ 270.837707][T16133] [ 270.840022][T16133] write to 0xffff88810524eb80 of 8 bytes by task 1832 on cpu 1: [ 270.847644][T16133] shmem_getpage_gfp+0xf9f/0x13d0 [ 270.852665][T16133] shmem_file_read_iter+0x1ae/0x5d0 [ 270.854903][T16148] loop0: detected capacity change from 0 to 16383 [ 270.857858][T16133] do_iter_readv_writev+0x2e8/0x360 [ 270.857882][T16133] do_iter_read+0x109/0x4b0 [ 270.873915][T16133] vfs_iter_read+0x4c/0x70 [ 270.878319][T16133] loop_process_work+0x110b/0x1850 [ 270.883423][T16133] loop_rootcg_workfn+0x1b/0x20 [ 270.888274][T16133] process_one_work+0x3e9/0x8f0 [ 270.893122][T16133] worker_thread+0x636/0xae0 [ 270.897708][T16133] kthread+0x262/0x280 [ 270.901770][T16133] ret_from_fork+0x1f/0x30 [ 270.906175][T16133] [ 270.908528][T16133] read to 0xffff88810524eb80 of 8 bytes by task 16133 on cpu 0: [ 270.916133][T16133] generic_fillattr+0x167/0x190 [ 270.920985][T16133] shmem_getattr+0x231/0x250 [ 270.925567][T16133] vfs_getattr_nosec+0x152/0x2f0 [ 270.930506][T16133] vfs_getattr+0x4d/0x60 [ 270.934751][T16133] loop_get_status+0x23e/0x310 [ 270.939517][T16133] lo_ioctl+0x1b0/0x1210 [ 270.943756][T16133] blkdev_ioctl+0x1d0/0x3c0 [ 270.948249][T16133] block_ioctl+0x6d/0x80 [ 270.952497][T16133] __se_sys_ioctl+0xcb/0x140 [ 270.957078][T16133] __x64_sys_ioctl+0x3f/0x50 [ 270.961661][T16133] do_syscall_64+0x3d/0x90 [ 270.966081][T16133] entry_SYSCALL_64_after_hwframe+0x44/0xae 07:50:30 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x1, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}]) 07:50:30 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) [ 270.971971][T16133] [ 270.974282][T16133] value changed: 0x0000000000000028 -> 0x0000000000000030 [ 270.975454][T16159] loop3: detected capacity change from 0 to 16383 [ 270.981367][T16133] [ 270.981371][T16133] Reported by Kernel Concurrency Sanitizer on: [ 270.981377][T16133] CPU: 0 PID: 16133 Comm: syz-executor.4 Not tainted 5.14.0-rc2-syzkaller #0 [ 270.981397][T16133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.014985][T16133] ================================================================== 07:50:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a3", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) accept4$unix(r1, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) [ 271.061434][T16166] loop2: detected capacity change from 0 to 16383 07:50:30 executing program 5: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) accept4$unix(r0, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20}]) 07:50:30 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x1, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}]) 07:50:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfc, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) r4 = syz_genetlink_get_family_id$wireguard(0x0, r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 271.127613][T16181] loop3: detected capacity change from 0 to 16383 [ 271.163879][T16188] loop4: detected capacity change from 0 to 16383 [ 271.164486][T16195] loop2: detected capacity change from 0 to 16383 07:50:30 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) accept4$unix(r0, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) accept4$unix(r0, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfc, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(r0, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) [ 271.170864][T16190] loop0: detected capacity change from 0 to 16383 07:50:30 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0xfffffffffffffffe}]) 07:50:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) r4 = syz_genetlink_get_family_id$wireguard(0x0, r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(r0, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(r0, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) [ 271.285183][T16218] loop3: detected capacity change from 0 to 16383 [ 271.303201][T16224] loop1: detected capacity change from 0 to 16383 [ 271.303247][T16225] loop2: detected capacity change from 0 to 16383 [ 271.316505][T16220] loop0: detected capacity change from 0 to 16383 [ 271.325825][T16227] loop4: detected capacity change from 0 to 7 07:50:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) r4 = syz_genetlink_get_family_id$wireguard(0x0, r0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0xfffffffffffffffe}]) 07:50:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) [ 271.394579][T16245] loop3: detected capacity change from 0 to 16383 [ 271.418337][T16251] loop1: detected capacity change from 0 to 16383 07:50:30 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) 07:50:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) accept4$unix(r0, 0x0, &(0x7f0000001cc0), 0x80000) 07:50:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, 0x0, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) accept4$unix(r0, 0x0, 0x0, 0x80000) [ 271.446244][T16261] loop4: detected capacity change from 0 to 7 [ 271.449888][T16259] loop2: detected capacity change from 0 to 16383 [ 271.459382][T16262] loop0: detected capacity change from 0 to 16383 07:50:31 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) accept4$unix(r0, 0x0, 0x0, 0x0) 07:50:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 271.506773][T16275] loop3: detected capacity change from 0 to 16383 07:50:31 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:31 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r2, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r3, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {0x0, 0x0, 0xfffffffffffffffe}]) 07:50:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, 0x0, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 271.573757][T16290] loop5: detected capacity change from 0 to 16383 [ 271.591419][T16294] loop4: detected capacity change from 0 to 7 [ 271.606127][T16296] loop2: detected capacity change from 0 to 16383 07:50:31 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:31 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r2, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r3, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 271.633699][T16308] loop3: detected capacity change from 0 to 16383 [ 271.635594][T16306] loop1: detected capacity change from 0 to 16383 [ 271.643823][T16311] loop0: detected capacity change from 0 to 16383 07:50:31 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r2, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r3, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, 0x0, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}]) 07:50:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}]) 07:50:31 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x1, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}]) [ 271.748626][T16325] loop5: detected capacity change from 0 to 16383 [ 271.752499][T16332] loop4: detected capacity change from 0 to 7 [ 271.759436][T16334] loop1: detected capacity change from 0 to 16383 [ 271.765069][T16335] loop3: detected capacity change from 0 to 16383 [ 271.779505][T16333] loop2: detected capacity change from 0 to 16383 [ 271.791586][T16337] loop0: detected capacity change from 0 to 16383 [ 271.830066][T16351] loop1: detected capacity change from 0 to 16383 07:50:31 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r2, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r3, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00), 0x0, 0xfffffffffffffffe}]) 07:50:31 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x1, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}]) 07:50:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a3", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 271.919444][T16368] loop2: detected capacity change from 0 to 16383 [ 271.926900][T16369] loop3: detected capacity change from 0 to 16383 [ 271.940921][T16371] loop4: detected capacity change from 0 to 7 [ 271.948597][T16379] loop1: detected capacity change from 0 to 16383 [ 271.952445][T16382] loop0: detected capacity change from 0 to 16383 07:50:31 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x1, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}]) 07:50:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e", 0x13, 0xfffffffffffffffe}]) 07:50:31 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 272.060789][T16402] loop2: detected capacity change from 0 to 16383 [ 272.066097][T16405] loop1: detected capacity change from 0 to 16383 [ 272.072511][T16403] loop3: detected capacity change from 0 to 16383 [ 272.086741][T16406] loop4: detected capacity change from 0 to 7 [ 272.097951][T16415] loop0: detected capacity change from 0 to 16383 07:50:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e", 0x13, 0xfffffffffffffffe}]) 07:50:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a3", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(0xffffffffffffffff, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) syz_read_part_table(0x5, 0x1, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}]) 07:50:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 272.190705][T16426] loop1: detected capacity change from 0 to 16383 [ 272.202148][T16427] loop4: detected capacity change from 0 to 16383 [ 272.218926][T16438] loop3: detected capacity change from 0 to 16383 [ 272.225885][T16439] loop2: detected capacity change from 0 to 16383 [ 272.226123][T16441] loop0: detected capacity change from 0 to 16383 07:50:31 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) 07:50:31 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) syz_read_part_table(0x5, 0x1, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}]) 07:50:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a", 0x1d, 0xfffffffffffffffe}]) accept4$unix(r3, 0x0, &(0x7f0000001cc0), 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1f, 0x8, 0x53, @private0, @mcast1, 0x10, 0x20, 0x6d3, 0xffffff28}}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) accept4(r0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e", 0x13, 0xfffffffffffffffe}]) 07:50:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a3", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, r4, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) [ 272.310384][T16455] loop4: detected capacity change from 0 to 16383 07:50:31 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x4, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107d94114632d08475d1a2eb37b70a332", 0xfe, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24a", 0xa, 0x38}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) [ 272.362146][T16467] loop3: detected capacity change from 0 to 16383 [ 272.369955][T16469] loop0: detected capacity change from 0 to 16383 [ 272.372709][T16473] loop2: detected capacity change from 0 to 16383 [ 272.383858][T16470] loop1: detected capacity change from 0 to 16383 07:50:31 executing program 5: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_read_part_table(0x5, 0x1, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfe, 0x8}]) 07:50:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={0x0, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000001a80)=[{&(0x7f00000017c0)="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", 0xfd, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001900)="563bd51de80e3ec0b05469f6c129b7f5fc02fbd187e5c43463725e3367c94ddf16de3d9378020e88a92a0cec8d5dc1a4a47c8c8a8b27300bce35fefbf3ee00f51fc672c27a207544b7188308f996d5f2b9c51368df86aca2b6f143098d94759017682d19af6c40cd527cd3a5c7557bb0154428871de520965dfcee6b37054654408a373311daf3df0a2b15972a961b87249e7a6450f991c0c9802f1fadfbad146697acece70b1a7fb93a6b3def5a5f3912f99a5724cc5092002a353e8586101d6f7c7176335e3099d5d240aa3c014487c8843d805e47ce0d50a6ac", 0xdb, 0x7ff}, {0x0, 0x0, 0xfffffffffffffffe}, {&(0x7f0000001a40)="5285d7cdbf8a6df20e3dbbcf9765cdcb930b58531a431a03e778b65e0fc470b0", 0x20, 0x7}]) accept4$unix(r3, &(0x7f0000001c40)=@abs, &(0x7f0000001cc0)=0x6e, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r3, 0x0, 0x48080) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000001c00)={&(0x7f0000001b00), 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x5c, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff9ae}]}, 0x5c}, 0x1, 0x0, 0x0, 0x91}, 0x20040880) 07:50:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000003c0)={0x0, "bae4b14bad41bad3c40e6eaed7cf900f"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000013c0)={r4, 0xe71, 0x5, 0x1}) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) syz_read_part_table(0x5, 0x3, &(0x7f0000001a80)=[{&(0x7f00000017c0)="a6d2df20708070027c5c8eb9aa122f8258be0b6fa34a5e5958e0a4f4d149aa2fc4be41a842fa8d7a86ca55e608262e6ce543534d554f10d11078ce05410a6ed4ceffc363df81dc8337ee58c55284a245679239a9f72926002d9adf456c6a2a236baff173529569c940542768be1e12bb72677d6bb508240b000418bee2b3874d6a6d285834a27e05e63907a2c08df05dec7c210cf803bebccdcd974946f125659bf9ab2661c2961c3dd29419c232a97ea8318c96980d7432625ccde235eea4892e9f255ff8d19d7c9dc5a8a575d01ac16d96d5a18cf541bf7fb6dfb9d17c94b620f9a758627df535d177e467de4107", 0xef, 0x8}, {&(0x7f00000018c0)="019389ef4d75a64ab24ab0", 0xb, 0x38}, {&(0x7f0000001a00)="9aee0101250fcc454d499a3fa363f2801b347e07b449b4face1368995a9810209d87317637ec", 0x26, 0xfffffffffffffffe}]) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1bc, 0x0, 0x124, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x150, 0x8, 0x0, 0x1, [{0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "19110e44e6115d8cc01f86aa929e7931c666d009c41e9f5e6649a4bc98b40cc1"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f0983a2b359f6e97af0fc6b5d3d986ccdd394df564e4fc3b485baa21c22170c3"}, @WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000100}, 0x48080) sendmsg$SE