NJECTION: forcing a failure.
[ 346.836290][T15130] name failslab, interval 1, probability 0, space 0, times 0
[ 346.849099][T15130] CPU: 1 PID: 15130 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 346.859201][T15130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 346.869317][T15130] Call Trace:
[ 346.872739][T15130]
[ 346.875781][T15130] dump_stack_lvl+0xda/0x130
[ 346.880459][T15130] dump_stack+0x15/0x20
04:58:57 executing program 0:
r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async, rerun: 64)
syz_clone3(&(0x7f0000000440)={0x8080000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0x1e}, &(0x7f0000000180)=""/218, 0xda, &(0x7f0000000280)=""/178, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0x0, 0x0], 0x4}, 0x58) (rerun: 64)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3, 0x69, 0x74, 0x9, 0x0, 0x10001, 0x80, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x6, 0x1}, 0x303, 0x80fc, 0x8000, 0x9, 0x20, 0x5e, 0x0, 0x0, 0x4, 0x0, 0xd}, r1, 0xa, r0, 0x8)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r3)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
04:58:57 executing program 2:
bpf$MAP_CREATE(0xa, &(0x7f0000000340), 0x48)
04:58:57 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000002500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000024c0)={&(0x7f0000002540)=ANY=[], 0x2380}}, 0x0)
[ 346.884844][T15130] should_fail_ex+0x21f/0x230
[ 346.889594][T15130] ? iter_file_splice_write+0xeb/0x7e0
[ 346.895170][T15130] __should_failslab+0x92/0xa0
[ 346.900001][T15130] should_failslab+0x9/0x20
[ 346.904605][T15130] __kmem_cache_alloc_node+0x4e/0x210
[ 346.910100][T15130] ? splice_from_pipe+0xe0/0xe0
[ 346.915015][T15130] ? iter_file_splice_write+0xeb/0x7e0
[ 346.920603][T15130] __kmalloc+0x95/0x1a0
[ 346.924802][T15130] iter_file_splice_write+0xeb/0x7e0
[ 346.930147][T15130] ? splice_from_pipe+0xe0/0xe0
04:58:57 executing program 2:
r0 = socket$vsock_stream(0x28, 0x1, 0x0)
setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040), 0x8)
[ 346.935076][T15130] direct_splice_actor+0x8a/0xb0
[ 346.940215][T15130] splice_direct_to_actor+0x31d/0x690
[ 346.945668][T15130] ? direct_file_splice_eof+0x70/0x70
[ 346.951219][T15130] do_splice_direct+0x10d/0x190
[ 346.956245][T15130] ? do_splice_direct+0x190/0x190
[ 346.961332][T15130] do_sendfile+0x3c4/0x980
[ 346.965893][T15130] __x64_sys_sendfile64+0x110/0x150
[ 346.971255][T15130] do_syscall_64+0x44/0x110
[ 346.975799][T15130] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 346.981927][T15130] RIP: 0033:0x7f8517f84ae9
[ 346.986419][T15130] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 347.006247][T15130] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 347.014880][T15130] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 347.022884][T15130] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
04:58:57 executing program 3:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) (async)
r1 = socket$kcm(0x2, 0x5, 0x0) (async)
r2 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0x128, 0x30, 0x1, 0x0, 0x0, {}, [{0x114, 0x1, [@m_skbedit={0x110, 0x13, 0x0, 0x0, {{0xc}, {0x64, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x400, 0x7, 0x8, 0x8, 0x7}}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x5, 0xfffffd8b, 0x4, 0x9, 0x1}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x2, 0x7}}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0xfbe, 0x4, 0xffff, 0x4}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x9}]}, {0x83, 0x6, "8c6e2abcf3d8f37e92c8f33c2e94eb5dfe962548c12eb0d000c50ceb4295ee041c41b1676b7601bf6f6ea0c65bd84026d190402beb61f97d10e4e28b74f4994f410865c9be57cbf27b10d83912907479e7b57eb0db0bb3087223e802051cfbcc10a328f4a4cd826e9bb9865e0e2a240e662e17b2c9f0b90e750efed86897f0"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}]}, 0x128}}, 0x0) (async)
getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000240)=""/163, &(0x7f0000000000)=0xa3) (async)
sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4005, @local}, 0x10, 0x0}, 0x30004081) (async)
setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000500)=r0, 0x4) (async)
close(r1)
[ 347.030938][T15130] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 347.038946][T15130] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 347.046958][T15130] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 347.055066][T15130]
04:58:57 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 42)
04:58:57 executing program 4:
r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x2301)
ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_CT_GET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x5, 0x1, 0x3}, 0x14}}, 0x0)
ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000040)={0x0, 'veth0_vlan\x00', {0x3}, 0x5c})
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001fc0), 0x0, 0x0)
getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0)
ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000000c0)={0xfeffffffffffff2e})
04:58:57 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000d80)=@newtaction={0x44, 0x14, 0x2161, 0x0, 0x0, {0x2}, [{0x30, 0x1, [@m_ife={0x2c, 0x2, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x44}}, 0x0)
04:58:57 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000700)={'wg0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', r1}, 0x48)
04:58:57 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000000), 0x8, 0x0)
preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/145, 0x91}], 0x1, 0x0, 0x0)
[ 347.083382][ T27] audit: type=1400 audit(1699678737.845:376): avc: denied { setopt } for pid=15157 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
04:58:57 executing program 3:
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, 0x0)
04:58:57 executing program 3:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000007c0)=ANY=[@ANYBLOB="90"], 0x390}}, 0x0)
[ 347.151130][T15174] netlink: 'syz-executor.5': attribute type 2 has an invalid length.
[ 347.212479][T15181] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15181 comm=syz-executor.3
[ 347.240622][T15182] loop1: detected capacity change from 0 to 2048
[ 347.267139][T15182] FAULT_INJECTION: forcing a failure.
[ 347.267139][T15182] name failslab, interval 1, probability 0, space 0, times 0
[ 347.279948][T15182] CPU: 1 PID: 15182 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 347.290083][T15182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 347.305683][T15182] Call Trace:
[ 347.309078][T15182]
[ 347.312194][T15182] dump_stack_lvl+0xda/0x130
[ 347.316940][T15182] dump_stack+0x15/0x20
[ 347.321172][T15182] should_fail_ex+0x21f/0x230
[ 347.326184][T15182] ? __blockdev_direct_IO+0x137/0x1f90
[ 347.331736][T15182] __should_failslab+0x92/0xa0
[ 347.336665][T15182] should_failslab+0x9/0x20
[ 347.341316][T15182] kmem_cache_alloc+0x4e/0x250
[ 347.346394][T15182] __blockdev_direct_IO+0x137/0x1f90
[ 347.351759][T15182] ? __rcu_read_unlock+0x4d/0x70
[ 347.356742][T15182] ? find_get_entries+0x397/0x410
[ 347.361974][T15182] ? fat_block_truncate_page+0x40/0x40
[ 347.367524][T15182] ? invalidate_inode_pages2_range+0x6cc/0x720
[ 347.373837][T15182] fat_direct_IO+0x110/0x1d0
[ 347.378533][T15182] generic_file_direct_write+0xab/0x1f0
[ 347.384263][T15182] ? mnt_put_write_access_file+0x95/0xb0
[ 347.390041][T15182] __generic_file_write_iter+0xae/0x120
[ 347.395735][T15182] generic_file_write_iter+0x7d/0x1c0
[ 347.401296][T15182] do_iter_write+0x4ad/0x770
[ 347.405965][T15182] ? iter_file_splice_write+0xeb/0x7e0
[ 347.411529][T15182] vfs_iter_write+0x56/0x70
[ 347.416110][T15182] iter_file_splice_write+0x462/0x7e0
[ 347.421709][T15182] ? splice_from_pipe+0xe0/0xe0
[ 347.426628][T15182] direct_splice_actor+0x8a/0xb0
[ 347.431641][T15182] splice_direct_to_actor+0x31d/0x690
[ 347.437061][T15182] ? direct_file_splice_eof+0x70/0x70
[ 347.442574][T15182] do_splice_direct+0x10d/0x190
[ 347.447621][T15182] ? do_splice_direct+0x190/0x190
[ 347.452787][T15182] do_sendfile+0x3c4/0x980
[ 347.457252][T15182] __x64_sys_sendfile64+0x110/0x150
[ 347.462583][T15182] do_syscall_64+0x44/0x110
[ 347.467231][T15182] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 347.473294][T15182] RIP: 0033:0x7f8517f84ae9
[ 347.477730][T15182] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 347.497377][T15182] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 347.505878][T15182] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
04:58:58 executing program 0:
r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async)
syz_clone3(&(0x7f0000000440)={0x8080000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0x1e}, &(0x7f0000000180)=""/218, 0xda, &(0x7f0000000280)=""/178, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0x0, 0x0], 0x4}, 0x58)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3, 0x69, 0x74, 0x9, 0x0, 0x10001, 0x80, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x6, 0x1}, 0x303, 0x80fc, 0x8000, 0x9, 0x20, 0x5e, 0x0, 0x0, 0x4, 0x0, 0xd}, r1, 0xa, r0, 0x8) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r3) (async)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
04:58:58 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000480)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000263b3c"], 0x20}}, 0x0)
04:58:58 executing program 5:
pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x4}, 0x0, 0x0)
04:58:58 executing program 4:
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0)
fsmount(0xffffffffffffffff, 0x0, 0x0)
syz_clone(0x40000000, &(0x7f0000000280), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000340))
04:58:58 executing program 3:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9003000010"], 0x390}}, 0x0)
04:58:58 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 43)
04:58:58 executing program 3:
bpf$BPF_MAP_CONST_STR_FREEZE(0x6, 0x0, 0x0)
04:58:58 executing program 2:
ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0x11105b87, 0x80000001, 0x5, 0x19a9, 0x1, 0xfff})
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a80000001d0001"], 0xb8}}, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@empty, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}}, 0xb8}}, 0x0)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x40, &(0x7f0000000a00)=0x101, 0x4)
bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10)
syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff)
sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10)
recvmmsg(r1, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000004ac0)=""/102389, 0x18ff5}, {&(0x7f0000000a80)=""/244}], 0x1}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000bc0)=""/227}, {&(0x7f0000000340)=""/41}], 0x0, &(0x7f0000000d00)=""/154}}], 0x2, 0x0, 0x0)
write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xc63b9e35)
[ 347.513894][T15182] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 347.522178][T15182] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 347.530177][T15182] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 347.538230][T15182] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 347.546231][T15182]
04:58:58 executing program 3:
bpf$MAP_CREATE(0x9, &(0x7f0000000340), 0x48)
[ 347.586809][T15195] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.2'.
04:58:58 executing program 4:
io_setup(0x1, &(0x7f00000001c0)=0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
io_submit(r0, 0x1, &(0x7f0000000c80)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000200)="c1", 0x1}])
04:58:58 executing program 3:
memfd_create(&(0x7f0000000040)='|\x12\xb1[\xfd\x8as\xe7\xef\xb1b\x98\xe5\x1dw#\xa8\xa3\xc0a\xdbt\xa8\xb8\xe0n\xf6\x86H=\t\x05\xfdE\x17\xe56\xbc\x8b\xbc\xab\\P\xb8\xa0d\xad\x13\x0f?\b\xb1C\xef\xbb\x9bHu\xb0\xb4\xe3\xff\x00\x8d\xa2g\xb0\xb1\x84\xf4\xee\x12wDj\xf3\r\xf8=\x8bl\xb5\xc86\x06\x8d\r\xee\x00\xc0\n4\xad\xe7+\xe8Z\x144\x9cdgu\xfbF\x0e4\x00\xf8\xff\xff\xff\xff\xff\xff\xa1\x80\xd5\xc8\"Q\xa0\xfc(\x03\x86\x95\x94\xd4\xd9\x97}\xd8,i\xec}j\"\xb9\xd8*XV\x00\x16d?\xc3`\x93\x83\xfb<\xa0\xc0\n\x02\x9dh\xd5)9\xa3\xf0\xb6m\x92A\x17\xfe\x82\xb5{q\x82h5A\x9c\xa2\x12\x93\xe2Ty\xdf\xd5G\xef\x1e\xd07\xd4\xf0\xca\v\xcb\xec\x81\xf8\xb2\"L\xad\x8f\x03U(R\xef\xe4\xab\x9am\xef\xec\x8f\xfd\xbaq\xfd\x80\x05\x8d{\xf7\x15\x86\x10\xa0i\xac\xcc5U\xbd6\xf8\xearx\xc8\x9c\xa7\xb4g3\\\xf1\xaavy\xf7Lt\xdfGqQy\x8dAi\xc6\xccH\x02\x7f\n\x80\xb3r', 0x0)
[ 347.651258][T15200] loop1: detected capacity change from 0 to 2048
04:58:58 executing program 3:
syz_clone(0x60800000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0))
04:58:58 executing program 0:
r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r2)
ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r2}}, './file0\x00'})
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = dup(r4)
r6 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_ifreq(r6, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_addrs=@l2={0x1f, 0x0, @fixed}})
r7 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x50, 0x0, 0x800, 0x70bd27, 0x25dfdff9, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4a}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x50}}, 0x20046004)
r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff)
r9 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$MPTCP_PM_CMD_GET_LIMITS(r7, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), r5)
sendmsg$NFT_BATCH(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x40000000, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0xb, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x74}}, 0x0)
ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_SET_COALESCE(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r10, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0)
sendmsg$NL80211_CMD_REGISTER_BEACONS(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYRESDEC=r8, @ANYRES16=r8, @ANYBLOB="040028530f00fbdbdf253c0200000800010050006784b84f4dc601041a10d00359795937286b2b0cd5a6d621e21c63810000000000000040004f0000009fb1058f45693499f96b65747bba6b29e8307e5b1bbfe883b52afb8a640d0ca7554cc9617f60e6dacc3cf5573855d9f1eb451c6bb0af9eab99c1526346f9116f06f43cff846f28a7608802e9cdebe47e3f92435d91913644320d1ad3a1f71b7419d6a7fca112e207f6f1d9abb183e6c433f80a801b"], 0x28}, 0x1, 0x0, 0x0, 0x4000010}, 0xc854)
r11 = socket$nl_generic(0x10, 0x3, 0x10)
r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_SET_COALESCE(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB="020e5dd5", @ANYRES16=r12, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r13, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0)
sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="d48487428266ba76df251300000008000300face0aaf55e19a0a2626", @ANYRES32=r13, @ANYRES64], 0x24}, 0x1, 0x0, 0x0, 0x4041}, 0x40090)
ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_TDLS_MGMT(r5, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x7c, r8, 0x100, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_IE={0x20, 0x2a, [@channel_switch={0x25, 0x3, {0x0, 0x64, 0x9}}, @erp={0x2a, 0x1, {0x1, 0x0, 0x1}}, @link_id={0x65, 0x12, {@initial, @broadcast, @device_b}}]}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x1f}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x80000001}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x27}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x2}, @NL80211_ATTR_TDLS_INITIATOR={0x4}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x4040001)
sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x2c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x298}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x8004)
sendmsg$NL80211_CMD_SET_WOWLAN(r3, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x340, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x30c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xd8, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x81, 0x8001, 0x10001}}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0xb9, 0x8, {0x4, 0xffffffc1, "71dc911002cbf6e57e0187b4bb11fcd21ad95804a5d3399ab3c0d7a035331dcbbf01f7554bfeda907c416e5bf3de937a4b124299e65e26351dc1968788c72cb936f19cd1bd2a0c3af3b8889a0436fea97fee86b54f518028a2e98ff35b02619b342bbea856c4c8e7d1ac6ab22def6de61cae567abedacedf5b67e97597603346fa4a2140769c742f03e1080407bcad5e83131d7c374acc6172204b002f6ffd14db1beccfbd37f1b5d7dad2bc0d"}}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x800}]}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x230, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_SSIDS={0x30, 0x2d, 0x0, 0x1, [{0xb, 0x0, @random="db6d4eda8e7cee"}, {0xa, 0x0, @default_ibss_ssid}, {0x6, 0x0, @random="ceed"}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1f4, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x13, 0x2, "6367dbe65dc668edcddcf2e14263e2"}, @NL80211_BAND_5GHZ={0x8f, 0x1, "6b5ea56e8ec48ebe4d60a189af5bef5b9dd514dc655936f7fa49287e941839ecc1e703075a7b2840ca50c1d72c191162118179ed4d1887980fb69918b105604fed6368ae815b659f1d5dfa641179e3e8488f303d431b5785bfebd1cdaf5e5c14eb9b331c2c2269499f8107a9421437bfffb26ab92c71485a41b3fba2366de8d122036bb084cae628b39073"}, @NL80211_BAND_6GHZ={0x22, 0x3, "6806b3eddc8938199c60c9f9e7c2f843b06db534c3061422345b82527cea"}, @NL80211_BAND_5GHZ={0xc3, 0x1, "0d2c580e2a8d8024544ca39b776cb02e65878731c2581d3103af4764d55bd3a4342f2f81ff25693668f4daa57484d3b016d42b26604415f682c46a5f1517c785267fc50a2e74e825c77e87d99f23aa2e670c0e26c7fffb82a7337d8b2bc1280b233f9aebb2e2aec4642980d1ed72a9c2c16b8576d789a3226ad2399b5b5bcd67e1de49c59ae42cd59694a4b5a539d5fea17956c224291ac9cef2adf9ab493e5cc8e1366cfbcda0446d499059242140400f113d04c0728588c15b2e2fc5f438"}, @NL80211_BAND_6GHZ={0x64, 0x3, "58a7de7631037f00a9bf052a4cd8d6832156951501631c34460496e3f01c457526fbd92bf314b10f04d77017e8c32bd225facd30e56c773237230485442eb60bc34edd55dd866d47cd61df84d61329ba953fae14c232bf4acde66f093466e299"}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x6}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x18, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}]}, 0x340}, 0x1, 0x0, 0x0, 0x40000}, 0x20008040)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r15, &(0x7f0000000000), 0xfdef)
[ 347.747299][T15212] bridge_slave_1: left allmulticast mode
[ 347.753014][T15212] bridge_slave_1: left promiscuous mode
[ 347.758777][T15212] bridge0: port 2(bridge_slave_1) entered disabled state
04:58:58 executing program 3:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x60800000, &(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0)
[ 347.787687][T15212] netlink: 'syz-executor.0': attribute type 11 has an invalid length.
[ 348.121235][T15200] syz-executor.1: attempt to access beyond end of device
[ 348.121235][T15200] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:58:59 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}]}, 0x34}}, 0x0)
04:58:59 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 44)
04:58:59 executing program 3:
pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x0)
04:58:59 executing program 0:
r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async, rerun: 64)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r2) (async, rerun: 64)
ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r2}}, './file0\x00'}) (async, rerun: 64)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = dup(r4) (async, rerun: 32)
r6 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32)
ioctl$sock_ifreq(r6, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_addrs=@l2={0x1f, 0x0, @fixed}}) (async, rerun: 64)
r7 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64)
sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x50, 0x0, 0x800, 0x70bd27, 0x25dfdff9, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4a}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x50}}, 0x20046004)
r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) (async)
r9 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$MPTCP_PM_CMD_GET_LIMITS(r7, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) (async)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), r5) (async, rerun: 64)
sendmsg$NFT_BATCH(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x40000000, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0xb, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x74}}, 0x0) (async, rerun: 64)
ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_SET_COALESCE(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r10, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0) (async, rerun: 32)
sendmsg$NL80211_CMD_REGISTER_BEACONS(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYRESDEC=r8, @ANYRES16=r8, @ANYBLOB="040028530f00fbdbdf253c0200000800010050006784b84f4dc601041a10d00359795937286b2b0cd5a6d621e21c63810000000000000040004f0000009fb1058f45693499f96b65747bba6b29e8307e5b1bbfe883b52afb8a640d0ca7554cc9617f60e6dacc3cf5573855d9f1eb451c6bb0af9eab99c1526346f9116f06f43cff846f28a7608802e9cdebe47e3f92435d91913644320d1ad3a1f71b7419d6a7fca112e207f6f1d9abb183e6c433f80a801b"], 0x28}, 0x1, 0x0, 0x0, 0x4000010}, 0xc854) (async, rerun: 32)
r11 = socket$nl_generic(0x10, 0x3, 0x10) (async)
r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_SET_COALESCE(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB="020e5dd5", @ANYRES16=r12, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r13, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0)
sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="d48487428266ba76df251300000008000300face0aaf55e19a0a2626", @ANYRES32=r13, @ANYRES64], 0x24}, 0x1, 0x0, 0x0, 0x4041}, 0x40090) (async)
ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_TDLS_MGMT(r5, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x7c, r8, 0x100, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_IE={0x20, 0x2a, [@channel_switch={0x25, 0x3, {0x0, 0x64, 0x9}}, @erp={0x2a, 0x1, {0x1, 0x0, 0x1}}, @link_id={0x65, 0x12, {@initial, @broadcast, @device_b}}]}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x1f}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x80000001}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x27}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x2}, @NL80211_ATTR_TDLS_INITIATOR={0x4}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x4040001) (async)
sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x2c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x298}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x8004) (async)
sendmsg$NL80211_CMD_SET_WOWLAN(r3, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x340, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x30c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xd8, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x81, 0x8001, 0x10001}}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0xb9, 0x8, {0x4, 0xffffffc1, "71dc911002cbf6e57e0187b4bb11fcd21ad95804a5d3399ab3c0d7a035331dcbbf01f7554bfeda907c416e5bf3de937a4b124299e65e26351dc1968788c72cb936f19cd1bd2a0c3af3b8889a0436fea97fee86b54f518028a2e98ff35b02619b342bbea856c4c8e7d1ac6ab22def6de61cae567abedacedf5b67e97597603346fa4a2140769c742f03e1080407bcad5e83131d7c374acc6172204b002f6ffd14db1beccfbd37f1b5d7dad2bc0d"}}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x800}]}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x230, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_SSIDS={0x30, 0x2d, 0x0, 0x1, [{0xb, 0x0, @random="db6d4eda8e7cee"}, {0xa, 0x0, @default_ibss_ssid}, {0x6, 0x0, @random="ceed"}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1f4, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x13, 0x2, "6367dbe65dc668edcddcf2e14263e2"}, @NL80211_BAND_5GHZ={0x8f, 0x1, "6b5ea56e8ec48ebe4d60a189af5bef5b9dd514dc655936f7fa49287e941839ecc1e703075a7b2840ca50c1d72c191162118179ed4d1887980fb69918b105604fed6368ae815b659f1d5dfa641179e3e8488f303d431b5785bfebd1cdaf5e5c14eb9b331c2c2269499f8107a9421437bfffb26ab92c71485a41b3fba2366de8d122036bb084cae628b39073"}, @NL80211_BAND_6GHZ={0x22, 0x3, "6806b3eddc8938199c60c9f9e7c2f843b06db534c3061422345b82527cea"}, @NL80211_BAND_5GHZ={0xc3, 0x1, "0d2c580e2a8d8024544ca39b776cb02e65878731c2581d3103af4764d55bd3a4342f2f81ff25693668f4daa57484d3b016d42b26604415f682c46a5f1517c785267fc50a2e74e825c77e87d99f23aa2e670c0e26c7fffb82a7337d8b2bc1280b233f9aebb2e2aec4642980d1ed72a9c2c16b8576d789a3226ad2399b5b5bcd67e1de49c59ae42cd59694a4b5a539d5fea17956c224291ac9cef2adf9ab493e5cc8e1366cfbcda0446d499059242140400f113d04c0728588c15b2e2fc5f438"}, @NL80211_BAND_6GHZ={0x64, 0x3, "58a7de7631037f00a9bf052a4cd8d6832156951501631c34460496e3f01c457526fbd92bf314b10f04d77017e8c32bd225facd30e56c773237230485442eb60bc34edd55dd866d47cd61df84d61329ba953fae14c232bf4acde66f093466e299"}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x6}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x18, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}]}, 0x340}, 0x1, 0x0, 0x0, 0x40000}, 0x20008040) (async)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r15, &(0x7f0000000000), 0xfdef)
04:58:59 executing program 5:
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x108, 0x1c0, 0x0, 0xffffffff, 0xffffffff, 0x2a0, 0x2a0, 0x2a0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, 0x0, 0x0, 'ip_vti0\x00', 'wlan1\x00'}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'nicvf0\x00', 'nicvf0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f4b1b9452f88b6c754854ece3e68d81380b64ecdf48ec04dfadfc01ddbf8"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310)
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040))
04:58:59 executing program 2:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5452, &(0x7f0000000000)={'vxcan1\x00'})
04:58:59 executing program 0:
r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r2) (async)
ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r2}}, './file0\x00'}) (async)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = dup(r4) (async)
r6 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_ifreq(r6, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_addrs=@l2={0x1f, 0x0, @fixed}}) (async)
r7 = socket$nl_generic(0x10, 0x3, 0x10) (async)
sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x50, 0x0, 0x800, 0x70bd27, 0x25dfdff9, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4a}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x50}}, 0x20046004)
r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) (async)
r9 = socket$nl_netfilter(0x10, 0x3, 0xc) (async)
sendmsg$MPTCP_PM_CMD_GET_LIMITS(r7, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) (async)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), r5)
sendmsg$NFT_BATCH(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x40000000, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0xb, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x74}}, 0x0) (async)
ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_SET_COALESCE(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r10, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0) (async)
sendmsg$NL80211_CMD_REGISTER_BEACONS(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYRESDEC=r8, @ANYRES16=r8, @ANYBLOB="040028530f00fbdbdf253c0200000800010050006784b84f4dc601041a10d00359795937286b2b0cd5a6d621e21c63810000000000000040004f0000009fb1058f45693499f96b65747bba6b29e8307e5b1bbfe883b52afb8a640d0ca7554cc9617f60e6dacc3cf5573855d9f1eb451c6bb0af9eab99c1526346f9116f06f43cff846f28a7608802e9cdebe47e3f92435d91913644320d1ad3a1f71b7419d6a7fca112e207f6f1d9abb183e6c433f80a801b"], 0x28}, 0x1, 0x0, 0x0, 0x4000010}, 0xc854)
r11 = socket$nl_generic(0x10, 0x3, 0x10)
r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) (async)
ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_SET_COALESCE(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB="020e5dd5", @ANYRES16=r12, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r13, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0) (async)
sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="d48487428266ba76df251300000008000300face0aaf55e19a0a2626", @ANYRES32=r13, @ANYRES64], 0x24}, 0x1, 0x0, 0x0, 0x4041}, 0x40090) (async)
ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_TDLS_MGMT(r5, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x7c, r8, 0x100, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_IE={0x20, 0x2a, [@channel_switch={0x25, 0x3, {0x0, 0x64, 0x9}}, @erp={0x2a, 0x1, {0x1, 0x0, 0x1}}, @link_id={0x65, 0x12, {@initial, @broadcast, @device_b}}]}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x1f}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x80000001}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x27}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x2}, @NL80211_ATTR_TDLS_INITIATOR={0x4}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x4040001) (async)
sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x2c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x298}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x8004) (async)
sendmsg$NL80211_CMD_SET_WOWLAN(r3, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x340, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x30c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xd8, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x81, 0x8001, 0x10001}}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0xb9, 0x8, {0x4, 0xffffffc1, "71dc911002cbf6e57e0187b4bb11fcd21ad95804a5d3399ab3c0d7a035331dcbbf01f7554bfeda907c416e5bf3de937a4b124299e65e26351dc1968788c72cb936f19cd1bd2a0c3af3b8889a0436fea97fee86b54f518028a2e98ff35b02619b342bbea856c4c8e7d1ac6ab22def6de61cae567abedacedf5b67e97597603346fa4a2140769c742f03e1080407bcad5e83131d7c374acc6172204b002f6ffd14db1beccfbd37f1b5d7dad2bc0d"}}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x800}]}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x230, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_SSIDS={0x30, 0x2d, 0x0, 0x1, [{0xb, 0x0, @random="db6d4eda8e7cee"}, {0xa, 0x0, @default_ibss_ssid}, {0x6, 0x0, @random="ceed"}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1f4, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x13, 0x2, "6367dbe65dc668edcddcf2e14263e2"}, @NL80211_BAND_5GHZ={0x8f, 0x1, "6b5ea56e8ec48ebe4d60a189af5bef5b9dd514dc655936f7fa49287e941839ecc1e703075a7b2840ca50c1d72c191162118179ed4d1887980fb69918b105604fed6368ae815b659f1d5dfa641179e3e8488f303d431b5785bfebd1cdaf5e5c14eb9b331c2c2269499f8107a9421437bfffb26ab92c71485a41b3fba2366de8d122036bb084cae628b39073"}, @NL80211_BAND_6GHZ={0x22, 0x3, "6806b3eddc8938199c60c9f9e7c2f843b06db534c3061422345b82527cea"}, @NL80211_BAND_5GHZ={0xc3, 0x1, "0d2c580e2a8d8024544ca39b776cb02e65878731c2581d3103af4764d55bd3a4342f2f81ff25693668f4daa57484d3b016d42b26604415f682c46a5f1517c785267fc50a2e74e825c77e87d99f23aa2e670c0e26c7fffb82a7337d8b2bc1280b233f9aebb2e2aec4642980d1ed72a9c2c16b8576d789a3226ad2399b5b5bcd67e1de49c59ae42cd59694a4b5a539d5fea17956c224291ac9cef2adf9ab493e5cc8e1366cfbcda0446d499059242140400f113d04c0728588c15b2e2fc5f438"}, @NL80211_BAND_6GHZ={0x64, 0x3, "58a7de7631037f00a9bf052a4cd8d6832156951501631c34460496e3f01c457526fbd92bf314b10f04d77017e8c32bd225facd30e56c773237230485442eb60bc34edd55dd866d47cd61df84d61329ba953fae14c232bf4acde66f093466e299"}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x6}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x18, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}]}, 0x340}, 0x1, 0x0, 0x0, 0x40000}, 0x20008040)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r15, &(0x7f0000000000), 0xfdef)
[ 348.474248][T15228] loop1: detected capacity change from 0 to 2048
04:58:59 executing program 2:
bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x0, 0x40, 0x2}, 0x48)
04:58:59 executing program 3:
pipe(&(0x7f0000000500)={0xffffffffffffffff})
epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000100))
04:58:59 executing program 5:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x401c5820, &(0x7f0000000600))
04:58:59 executing program 0:
r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r2)
ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000440)={0x0, 0x7, 0x0, [0x101, 0x0, 0x5, 0xc85, 0x8], [0x1000, 0x0, 0x1, 0x7, 0x5, 0xffffffffffffffff, 0x1, 0x2, 0x3, 0x3, 0x0, 0xffff, 0x6, 0x200, 0xfffffffffffffff7, 0x3, 0x200, 0x6, 0x1b4, 0x8, 0x4f9c, 0x8000, 0x9a, 0x200, 0x6, 0x2b9a, 0x1c1, 0x5, 0x1200000000000000, 0x1ff, 0x2, 0xfffffffffffffe00, 0x8, 0x10000, 0x7f, 0x3, 0x80, 0x7, 0x84, 0xffffffffffffff9e, 0x4, 0xbeae, 0x7, 0x7, 0x6, 0x7dd, 0x7ff, 0x80000000, 0xa8, 0x1f, 0x4380, 0x0, 0x81, 0x9, 0xc1, 0x1, 0x100, 0xffffffffffffff6d, 0xc4, 0xc18a, 0x3, 0x4, 0x200, 0x80, 0x8015, 0x7, 0x4, 0xbebd, 0x4, 0x458, 0x5, 0x1, 0x0, 0x8, 0x6, 0x0, 0x80000000, 0x5, 0x7, 0x5, 0x89, 0x4, 0x100, 0x8, 0xa791, 0xfff, 0x4, 0x50b8, 0x400, 0xffffffffffffcec0, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x8, 0x10001, 0x5, 0xfffffffffffff801, 0x8, 0x6, 0x5, 0x100000000, 0xff0, 0x5, 0x9, 0x4, 0x96b, 0xfffffffffffffffe, 0x0, 0x1d50, 0x5, 0x9, 0x7a, 0x4d9b, 0x8, 0x0, 0x7ff, 0x0, 0x9, 0x6312]})
ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000880)={r3, 0xbc5, 0x0, [0x2, 0x1, 0x80000001, 0x9, 0x6], [0x800, 0x0, 0xfffffffffffffff7, 0x8, 0xffd1, 0x81, 0x8000, 0x0, 0x7fffffff, 0xf8b, 0x5, 0x7, 0x10000, 0x6, 0x80000001, 0x2, 0x6, 0x3, 0x63, 0x3, 0x100, 0x200000000000000, 0x3, 0x7, 0x81, 0x4, 0x0, 0x8, 0xfffffffeffffffff, 0x3, 0xff, 0xe000000000, 0x3, 0x3c, 0x3, 0x8000000000000000, 0x8001, 0x3, 0x460, 0xfffffffffffffffa, 0x20, 0xe1c4, 0x2, 0xc04, 0x4, 0xfff, 0x8001, 0x2, 0x7, 0x1, 0x1, 0xc65, 0x80, 0x3c78, 0x7ff, 0x8000000000000001, 0x59, 0x5749, 0x5, 0x9, 0x7, 0x1ca1, 0x4, 0x4, 0x5, 0x9, 0x100000001, 0x7f, 0xa3e1, 0x6, 0x9f8, 0xfff, 0x7f, 0x9, 0x9, 0xe18b, 0x80dc, 0x5, 0x1, 0x5, 0x1, 0xfffffffffffff747, 0x4, 0x5, 0x1, 0xf85e, 0xffffffffffffffff, 0xfffffffffffffb7a, 0x9, 0x2, 0x624fadc2, 0x100000000, 0x9e1, 0x1, 0x2, 0x9, 0x2f90, 0x0, 0x87, 0x4, 0x8, 0x4, 0x3, 0xfffffffffffffffa, 0x7, 0x80000000, 0x9e7, 0x1f, 0x0, 0x3, 0x3ff, 0x9, 0x0, 0x31fca8d1, 0x7fff, 0x100000001, 0xff, 0xffffffffbfa4a976, 0x7, 0x6]})
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
04:58:59 executing program 4:
mmap$xdp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x40030, 0xffffffffffffffff, 0x0)
04:58:59 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x9)
sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0)
04:58:59 executing program 2:
syz_open_procfs$namespace(0x0, &(0x7f0000001500)='ns/cgroup\x00')
[ 348.645748][ T27] audit: type=1400 audit(1699678739.415:377): avc: denied { execute } for pid=15251 comm="syz-executor.4" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=43549 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1
[ 348.649535][T15255] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15255 comm=syz-executor.3
04:58:59 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 45)
04:58:59 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r2)
ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000440)={0x0, 0x7, 0x0, [0x101, 0x0, 0x5, 0xc85, 0x8], [0x1000, 0x0, 0x1, 0x7, 0x5, 0xffffffffffffffff, 0x1, 0x2, 0x3, 0x3, 0x0, 0xffff, 0x6, 0x200, 0xfffffffffffffff7, 0x3, 0x200, 0x6, 0x1b4, 0x8, 0x4f9c, 0x8000, 0x9a, 0x200, 0x6, 0x2b9a, 0x1c1, 0x5, 0x1200000000000000, 0x1ff, 0x2, 0xfffffffffffffe00, 0x8, 0x10000, 0x7f, 0x3, 0x80, 0x7, 0x84, 0xffffffffffffff9e, 0x4, 0xbeae, 0x7, 0x7, 0x6, 0x7dd, 0x7ff, 0x80000000, 0xa8, 0x1f, 0x4380, 0x0, 0x81, 0x9, 0xc1, 0x1, 0x100, 0xffffffffffffff6d, 0xc4, 0xc18a, 0x3, 0x4, 0x200, 0x80, 0x8015, 0x7, 0x4, 0xbebd, 0x4, 0x458, 0x5, 0x1, 0x0, 0x8, 0x6, 0x0, 0x80000000, 0x5, 0x7, 0x5, 0x89, 0x4, 0x100, 0x8, 0xa791, 0xfff, 0x4, 0x50b8, 0x400, 0xffffffffffffcec0, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x8, 0x10001, 0x5, 0xfffffffffffff801, 0x8, 0x6, 0x5, 0x100000000, 0xff0, 0x5, 0x9, 0x4, 0x96b, 0xfffffffffffffffe, 0x0, 0x1d50, 0x5, 0x9, 0x7a, 0x4d9b, 0x8, 0x0, 0x7ff, 0x0, 0x9, 0x6312]})
ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000880)={r3, 0xbc5, 0x0, [0x2, 0x1, 0x80000001, 0x9, 0x6], [0x800, 0x0, 0xfffffffffffffff7, 0x8, 0xffd1, 0x81, 0x8000, 0x0, 0x7fffffff, 0xf8b, 0x5, 0x7, 0x10000, 0x6, 0x80000001, 0x2, 0x6, 0x3, 0x63, 0x3, 0x100, 0x200000000000000, 0x3, 0x7, 0x81, 0x4, 0x0, 0x8, 0xfffffffeffffffff, 0x3, 0xff, 0xe000000000, 0x3, 0x3c, 0x3, 0x8000000000000000, 0x8001, 0x3, 0x460, 0xfffffffffffffffa, 0x20, 0xe1c4, 0x2, 0xc04, 0x4, 0xfff, 0x8001, 0x2, 0x7, 0x1, 0x1, 0xc65, 0x80, 0x3c78, 0x7ff, 0x8000000000000001, 0x59, 0x5749, 0x5, 0x9, 0x7, 0x1ca1, 0x4, 0x4, 0x5, 0x9, 0x100000001, 0x7f, 0xa3e1, 0x6, 0x9f8, 0xfff, 0x7f, 0x9, 0x9, 0xe18b, 0x80dc, 0x5, 0x1, 0x5, 0x1, 0xfffffffffffff747, 0x4, 0x5, 0x1, 0xf85e, 0xffffffffffffffff, 0xfffffffffffffb7a, 0x9, 0x2, 0x624fadc2, 0x100000000, 0x9e1, 0x1, 0x2, 0x9, 0x2f90, 0x0, 0x87, 0x4, 0x8, 0x4, 0x3, 0xfffffffffffffffa, 0x7, 0x80000000, 0x9e7, 0x1f, 0x0, 0x3, 0x3ff, 0x9, 0x0, 0x31fca8d1, 0x7fff, 0x100000001, 0xff, 0xffffffffbfa4a976, 0x7, 0x6]})
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
04:58:59 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)="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", 0x7f8}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000010c0)=[{0x0}, {&(0x7f0000000dc0)="459f6f543dc3b0fd1e401ba0c714ca3e4dfbd2f0170ee86a2f7d6ba02650d255614a9ccae7a7bdcd2ed09b87774184934094e2d4324df8b512eebbf4cc0784c47dae888f0bff689b25c5778183daae2c2e3b5fa3eef32386f4c0f2e6ed8f460a46036e5255358e8ae00b8680c1679a44af6b4fba977cac89d7b141d9b3d8ae", 0x7f}], 0x2}}], 0x3, 0x0)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4)
sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27)
04:58:59 executing program 2:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8912, &(0x7f0000000000)={'vxcan1\x00'})
04:58:59 executing program 4:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000600))
04:58:59 executing program 3:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0})
sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0)
04:58:59 executing program 3:
socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff})
syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r0)
[ 348.872924][T15228] syz-executor.1: attempt to access beyond end of device
[ 348.872924][T15228] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:58:59 executing program 2:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000))
04:58:59 executing program 0:
r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r2) (async)
ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000440)={0x0, 0x7, 0x0, [0x101, 0x0, 0x5, 0xc85, 0x8], [0x1000, 0x0, 0x1, 0x7, 0x5, 0xffffffffffffffff, 0x1, 0x2, 0x3, 0x3, 0x0, 0xffff, 0x6, 0x200, 0xfffffffffffffff7, 0x3, 0x200, 0x6, 0x1b4, 0x8, 0x4f9c, 0x8000, 0x9a, 0x200, 0x6, 0x2b9a, 0x1c1, 0x5, 0x1200000000000000, 0x1ff, 0x2, 0xfffffffffffffe00, 0x8, 0x10000, 0x7f, 0x3, 0x80, 0x7, 0x84, 0xffffffffffffff9e, 0x4, 0xbeae, 0x7, 0x7, 0x6, 0x7dd, 0x7ff, 0x80000000, 0xa8, 0x1f, 0x4380, 0x0, 0x81, 0x9, 0xc1, 0x1, 0x100, 0xffffffffffffff6d, 0xc4, 0xc18a, 0x3, 0x4, 0x200, 0x80, 0x8015, 0x7, 0x4, 0xbebd, 0x4, 0x458, 0x5, 0x1, 0x0, 0x8, 0x6, 0x0, 0x80000000, 0x5, 0x7, 0x5, 0x89, 0x4, 0x100, 0x8, 0xa791, 0xfff, 0x4, 0x50b8, 0x400, 0xffffffffffffcec0, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x8, 0x10001, 0x5, 0xfffffffffffff801, 0x8, 0x6, 0x5, 0x100000000, 0xff0, 0x5, 0x9, 0x4, 0x96b, 0xfffffffffffffffe, 0x0, 0x1d50, 0x5, 0x9, 0x7a, 0x4d9b, 0x8, 0x0, 0x7ff, 0x0, 0x9, 0x6312]})
ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000880)={r3, 0xbc5, 0x0, [0x2, 0x1, 0x80000001, 0x9, 0x6], [0x800, 0x0, 0xfffffffffffffff7, 0x8, 0xffd1, 0x81, 0x8000, 0x0, 0x7fffffff, 0xf8b, 0x5, 0x7, 0x10000, 0x6, 0x80000001, 0x2, 0x6, 0x3, 0x63, 0x3, 0x100, 0x200000000000000, 0x3, 0x7, 0x81, 0x4, 0x0, 0x8, 0xfffffffeffffffff, 0x3, 0xff, 0xe000000000, 0x3, 0x3c, 0x3, 0x8000000000000000, 0x8001, 0x3, 0x460, 0xfffffffffffffffa, 0x20, 0xe1c4, 0x2, 0xc04, 0x4, 0xfff, 0x8001, 0x2, 0x7, 0x1, 0x1, 0xc65, 0x80, 0x3c78, 0x7ff, 0x8000000000000001, 0x59, 0x5749, 0x5, 0x9, 0x7, 0x1ca1, 0x4, 0x4, 0x5, 0x9, 0x100000001, 0x7f, 0xa3e1, 0x6, 0x9f8, 0xfff, 0x7f, 0x9, 0x9, 0xe18b, 0x80dc, 0x5, 0x1, 0x5, 0x1, 0xfffffffffffff747, 0x4, 0x5, 0x1, 0xf85e, 0xffffffffffffffff, 0xfffffffffffffb7a, 0x9, 0x2, 0x624fadc2, 0x100000000, 0x9e1, 0x1, 0x2, 0x9, 0x2f90, 0x0, 0x87, 0x4, 0x8, 0x4, 0x3, 0xfffffffffffffffa, 0x7, 0x80000000, 0x9e7, 0x1f, 0x0, 0x3, 0x3ff, 0x9, 0x0, 0x31fca8d1, 0x7fff, 0x100000001, 0xff, 0xffffffffbfa4a976, 0x7, 0x6]}) (async)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
04:58:59 executing program 2:
bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x48)
04:58:59 executing program 4:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x26)
04:58:59 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x90, 0x30, 0x1, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0xb}], [@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0)
close(r0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='*[:)\'*%*#_\x00')
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r3)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
[ 348.979723][T15272] loop1: detected capacity change from 0 to 2048
04:59:00 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 46)
04:59:00 executing program 4:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000600))
[ 349.295817][T15272] syz-executor.1: attempt to access beyond end of device
[ 349.295817][T15272] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 349.351191][T15289] loop1: detected capacity change from 0 to 2048
[ 349.599979][T15289] syz-executor.1: attempt to access beyond end of device
[ 349.599979][T15289] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:00 executing program 5:
socketpair(0x18, 0x0, 0x2, &(0x7f0000000880))
04:59:00 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async, rerun: 32)
r0 = socket$nl_route(0x10, 0x3, 0x0) (rerun: 32)
sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x90, 0x30, 0x1, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0xb}], [@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) (async)
close(r0) (async)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='*[:)\'*%*#_\x00')
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r3) (async, rerun: 32)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (rerun: 32)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
04:59:00 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
write$binfmt_script(r0, &(0x7f0000000600)={'#! ', './file0'}, 0xb)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000))
04:59:00 executing program 4:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x401c5820, &(0x7f0000000000)={'vxcan1\x00'})
04:59:00 executing program 4:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000340))
04:59:00 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 47)
04:59:00 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async)
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x90, 0x30, 0x1, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0xb}], [@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) (async)
close(r0) (async)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='*[:)\'*%*#_\x00') (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r3)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
04:59:00 executing program 2:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000006c0)='ext4_es_remove_extent\x00', r0}, 0x10)
sendmsg$inet(0xffffffffffffffff, 0x0, 0x0)
socket(0x3, 0x3, 0x8)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
04:59:00 executing program 3:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'veth0_virt_wifi\x00', 0x2})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'})
r1 = socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, 0x0)
04:59:00 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@gettaction={0x28, 0x32, 0x1, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x28}}, 0x0)
04:59:00 executing program 0:
r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r2)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0)
r5 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0)
ppoll(&(0x7f00000000c0)=[{r2, 0x80d0}, {r0, 0x100}, {r4, 0x304}, {r5, 0x11b}, {r0, 0x40}], 0x5, &(0x7f0000000100), &(0x7f0000000140)={[0x7]}, 0x8)
getpeername$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
04:59:00 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x1a, &(0x7f0000000540)={&(0x7f0000000340)={0xfffffffffffffd93, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x18}}, 0x0)
04:59:00 executing program 4:
pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x1}, &(0x7f0000000100)={0x0, 0x3938700}, 0x0)
04:59:00 executing program 3:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff})
sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0)
[ 349.838869][ T27] audit: type=1400 audit(1699678740.615:378): avc: denied { create } for pid=15308 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1
[ 349.869268][T15315] veth0_virt_wifi: mtu less than device minimum
[ 349.869872][T15302] loop1: detected capacity change from 0 to 2048
04:59:00 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f00000001c0)=@ringbuf, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380)}, 0x90)
04:59:00 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0xa)
sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0)
[ 349.939987][T15302] FAULT_INJECTION: forcing a failure.
[ 349.939987][T15302] name failslab, interval 1, probability 0, space 0, times 0
[ 349.952810][T15302] CPU: 0 PID: 15302 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 349.963352][T15302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 349.973452][T15302] Call Trace:
[ 349.976766][T15302]
[ 349.979901][T15302] dump_stack_lvl+0xda/0x130
[ 349.984545][T15302] dump_stack+0x15/0x20
04:59:00 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}]}, 0x38}}, 0x0)
[ 349.988804][T15302] should_fail_ex+0x21f/0x230
[ 349.993573][T15302] ? iter_file_splice_write+0xeb/0x7e0
[ 349.999246][T15302] __should_failslab+0x92/0xa0
[ 350.004150][T15302] should_failslab+0x9/0x20
[ 350.008791][T15302] __kmem_cache_alloc_node+0x4e/0x210
[ 350.014227][T15302] ? splice_from_pipe+0xe0/0xe0
[ 350.019152][T15302] ? iter_file_splice_write+0xeb/0x7e0
[ 350.024766][T15302] __kmalloc+0x95/0x1a0
[ 350.028982][T15302] iter_file_splice_write+0xeb/0x7e0
[ 350.034438][T15302] ? splice_from_pipe+0xe0/0xe0
[ 350.039342][T15302] direct_splice_actor+0x8a/0xb0
[ 350.044389][T15302] splice_direct_to_actor+0x31d/0x690
[ 350.049925][T15302] ? direct_file_splice_eof+0x70/0x70
[ 350.055365][T15302] do_splice_direct+0x10d/0x190
[ 350.060520][T15302] ? do_splice_direct+0x190/0x190
[ 350.065661][T15302] do_sendfile+0x3c4/0x980
[ 350.070192][T15302] __x64_sys_sendfile64+0x110/0x150
[ 350.075451][T15302] do_syscall_64+0x44/0x110
[ 350.080100][T15302] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 350.086053][T15302] RIP: 0033:0x7f8517f84ae9
[ 350.090560][T15302] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 350.110189][T15302] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 350.118610][T15302] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 350.126585][T15302] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
04:59:00 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 48)
04:59:00 executing program 3:
io_setup(0x1, &(0x7f00000001c0)=0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
io_submit(r0, 0x1, &(0x7f0000000c80)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x7ff, r1, 0x0, 0x0, 0x0, 0x0, 0x2}])
04:59:00 executing program 5:
bpf$MAP_CREATE(0x1e, &(0x7f0000000340), 0x48)
04:59:00 executing program 4:
socketpair(0x1, 0x5, 0x0, &(0x7f0000000040))
04:59:00 executing program 2:
bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x8}, 0x48)
[ 350.134655][T15302] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 350.142862][T15302] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 350.150949][T15302] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 350.158954][T15302]
[ 350.221503][T15339] loop1: detected capacity change from 0 to 2048
[ 350.242358][T15339] FAULT_INJECTION: forcing a failure.
[ 350.242358][T15339] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 350.255997][T15339] CPU: 1 PID: 15339 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 350.266232][T15339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 350.276316][T15339] Call Trace:
[ 350.279601][T15339]
[ 350.282563][T15339] dump_stack_lvl+0xda/0x130
[ 350.287251][T15339] dump_stack+0x15/0x20
[ 350.291528][T15339] should_fail_ex+0x21f/0x230
[ 350.296477][T15339] __should_fail_alloc_page+0xfd/0x110
[ 350.302061][T15339] __alloc_pages+0x108/0x340
[ 350.306753][T15339] alloc_pages_mpol+0xb1/0x1d0
[ 350.311648][T15339] folio_alloc+0xea/0x120
[ 350.315990][T15339] filemap_alloc_folio+0x68/0x220
[ 350.321119][T15339] __filemap_get_folio+0x298/0x5a0
[ 350.326243][T15339] ? invalidate_inode_pages2_range+0x6de/0x720
[ 350.332852][T15339] pagecache_get_page+0x2a/0x90
[ 350.337756][T15339] ? fat_block_truncate_page+0x40/0x40
[ 350.343357][T15339] grab_cache_page_write_begin+0x2e/0x40
[ 350.349005][T15339] block_write_begin+0x31/0x170
[ 350.353920][T15339] cont_write_begin+0x479/0x690
[ 350.358915][T15339] fat_write_begin+0x61/0xf0
[ 350.363522][T15339] ? fat_block_truncate_page+0x40/0x40
[ 350.369152][T15339] generic_perform_write+0x1c9/0x410
[ 350.374524][T15339] ? generic_file_direct_write+0x1dc/0x1f0
[ 350.380344][T15339] __generic_file_write_iter+0xec/0x120
[ 350.385903][T15339] generic_file_write_iter+0x7d/0x1c0
[ 350.391337][T15339] do_iter_write+0x4ad/0x770
[ 350.395963][T15339] ? iter_file_splice_write+0xeb/0x7e0
[ 350.401474][T15339] vfs_iter_write+0x56/0x70
[ 350.406062][T15339] iter_file_splice_write+0x462/0x7e0
[ 350.411520][T15339] ? splice_from_pipe+0xe0/0xe0
[ 350.416406][T15339] direct_splice_actor+0x8a/0xb0
[ 350.421364][T15339] splice_direct_to_actor+0x31d/0x690
[ 350.426755][T15339] ? direct_file_splice_eof+0x70/0x70
[ 350.432413][T15339] do_splice_direct+0x10d/0x190
[ 350.437367][T15339] ? do_splice_direct+0x190/0x190
[ 350.442409][T15339] do_sendfile+0x3c4/0x980
[ 350.446869][T15339] __x64_sys_sendfile64+0x110/0x150
[ 350.452156][T15339] do_syscall_64+0x44/0x110
[ 350.456681][T15339] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 350.462958][T15339] RIP: 0033:0x7f8517f84ae9
[ 350.467377][T15339] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 350.487173][T15339] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 350.496301][T15339] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 350.504435][T15339] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 350.512558][T15339] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 350.520619][T15339] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 350.528594][T15339] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 350.536582][T15339]
04:59:01 executing program 0:
r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r2)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) (async)
r5 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0)
ppoll(&(0x7f00000000c0)=[{r2, 0x80d0}, {r0, 0x100}, {r4, 0x304}, {r5, 0x11b}, {r0, 0x40}], 0x5, &(0x7f0000000100), &(0x7f0000000140)={[0x7]}, 0x8) (async)
getpeername$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
04:59:01 executing program 4:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0})
sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xe}}}, 0x24}}, 0x0)
04:59:01 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffb}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}]}, 0x38}}, 0x0)
04:59:01 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000cc0)={&(0x7f0000000c00), 0xfffffeab, &(0x7f0000000080)={&(0x7f0000000c40)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@SMC_PNETID_IBPORT={0x5}]}, 0x1c}}, 0x0)
04:59:01 executing program 3:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)="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", 0x815}], 0x1}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)="1309d6e8ff3753eba2c6822500266768b36b79725a757bc6b16e64ccfa64a1c31942551fbcd409fd5c6b2317d929f150cf7ada622eefb4f24530df88", 0x3c}, {&(0x7f0000000a80)="75d5a9b50779e8af955b2d40d2706f078c703ff0d9d433e4898865b6c87f05608a383bf55efa0fcbff4617fdb5cbb21619a18d70ed5d90bf709075a3a751ff998a8dc4d8b8eaee481ba19d8b1e7938906b84553a174473593271316ce51caa1e54ef4b7b8baf91ffebc8077da77523a29e6ddc51d86cd5645eacb040e3c78383489cf11d6a343e05705962b32252d6c52375f9a125f0e64bf183788dea033a98da593f8e9380", 0xa6}], 0x2}}, {{0x0, 0x0, &(0x7f00000010c0)=[{0x0}, {&(0x7f0000000d40)="0eeb182c0842b46450841de6", 0xc}, {0x0}], 0x3}}], 0x3, 0x0)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4)
sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27)
04:59:01 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 49)
04:59:01 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000001300)=@ipv6_newnexthop={0x40, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14, 0x3}}, @NHA_OIF={0x8, 0x5, r1}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x4}]}, 0x40}}, 0x0)
04:59:01 executing program 5:
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080))
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r0, 0x34, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180), 0x0}, 0x40)
04:59:01 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x4, &(0x7f0000000600)=@framed={{}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000000540)='syzkaller\x00'}, 0x90)
04:59:01 executing program 5:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={0x0}}, 0x81)
04:59:01 executing program 4:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff})
getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000180))
[ 350.757720][T15346] loop1: detected capacity change from 0 to 2048
04:59:01 executing program 5:
pselect6(0x40, &(0x7f0000000000), &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x0)
[ 351.065431][T15346] syz-executor.1: attempt to access beyond end of device
[ 351.065431][T15346] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:02 executing program 0:
r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r2)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0)
r5 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0)
ppoll(&(0x7f00000000c0)=[{r2, 0x80d0}, {r0, 0x100}, {r4, 0x304}, {r5, 0x11b}, {r0, 0x40}], 0x5, &(0x7f0000000100), &(0x7f0000000140)={[0x7]}, 0x8)
getpeername$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) (async)
close(r2) (async)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) (async)
fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) (async)
ppoll(&(0x7f00000000c0)=[{r2, 0x80d0}, {r0, 0x100}, {r4, 0x304}, {r5, 0x11b}, {r0, 0x40}], 0x5, &(0x7f0000000100), &(0x7f0000000140)={[0x7]}, 0x8) (async)
getpeername$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) (async)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) (async)
04:59:02 executing program 2:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4)
sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)}], 0x1}}], 0x1, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4)
sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27)
sendto$inet(r0, &(0x7f00000004c0)="43cb12c6db497699528530fefd5d799feb2d636270d12e3f833265139ca2f3902bda86f768eb13d790b54eeea91c4dce97d66258b6317481b8fd8566a0c0f4e1acf5591178bb4008bc0a2ef065d867f8fc234b5f96cfe50aad1a7fefd64aa374345dcc4dbf42250092a5c5f9b0fe5dbb7c9841cad1259bfe095d69f96ea1855a4bf38aa56cdbab05762a86e3a70915cb9c230e0b913f011e63abfd3781033477f05f7f31a77eb32f243b54c0985e1b447ca08858ddf511404c7e0cfc533d400b76a5114baff01724c9c8b9d1fe58c2d692a0fc56681183e03d875f810e843d80fd41eb762ee733fa9e319a2c4f", 0xed, 0x4004, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10)
04:59:02 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff)
sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r1, 0x1}, 0x14}}, 0x0)
04:59:02 executing program 5:
socket$pppl2tp(0x18, 0x1, 0x1)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000001380)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001340)={&(0x7f0000001240)=@RTM_NEWNSID={0x1c, 0x58, 0x201, 0x0, 0x0, {}, [@NETNSA_FD={0x8}]}, 0x1c}}, 0x80)
04:59:02 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 50)
04:59:02 executing program 3:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0xc0189436, &(0x7f0000000600))
04:59:02 executing program 3:
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@map=0x1, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
04:59:02 executing program 4:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0})
sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}, {0x0, 0xe}}}, 0x24}}, 0x0)
04:59:02 executing program 5:
socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0)
[ 351.594156][T15376] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'.
04:59:02 executing program 4:
bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48)
04:59:02 executing program 3:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
04:59:02 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7907e486dd631703a2000000200000000000000000000000007fffffdc4bac4640ae3e42ccdd468eff000195a20eacdb01c447a7090000008e7781b6000000000000"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
[ 351.641720][T15371] loop1: detected capacity change from 0 to 2048
04:59:02 executing program 3:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0)
04:59:02 executing program 2:
r0 = socket$l2tp6(0xa, 0x2, 0x73)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000d80)=@security={'security\x00', 0xe, 0x4, 0x378, 0xffffffff, 0x0, 0x198, 0x2a0, 0xffffffff, 0xffffffff, 0x3c0, 0x3c0, 0x3c0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@local}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d8)
04:59:02 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7907e486dd631703a2000000200000000000000000000000007fffffdc4bac4640ae3e42ccdd468eff000195a20eacdb01c447a7090000008e7781b6000000000000"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7907e486dd631703a2000000200000000000000000000000007fffffdc4bac4640ae3e42ccdd468eff000195a20eacdb01c447a7090000008e7781b6000000000000"], 0xfdef) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
close(r1) (async)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) (async)
04:59:02 executing program 4:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x8902, &(0x7f0000000600))
04:59:02 executing program 3:
pipe(&(0x7f0000000500)={0xffffffffffffffff})
epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000100)={0x20000008})
04:59:02 executing program 5:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8924, &(0x7f0000000000)={'vxcan1\x00'})
04:59:02 executing program 2:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x40086602, &(0x7f0000000600))
04:59:02 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7907e486dd631703a2000000200000000000000000000000007fffffdc4bac4640ae3e42ccdd468eff000195a20eacdb01c447a7090000008e7781b6000000000000"], 0xfdef) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
04:59:02 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 51)
04:59:02 executing program 4:
socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[], 0x20}}, 0x0)
[ 352.002798][T15371] syz-executor.1: attempt to access beyond end of device
[ 352.002798][T15371] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:02 executing program 2:
r0 = socket$inet(0x2, 0x803, 0x2)
setsockopt$inet_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0)
04:59:02 executing program 5:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x80047453, 0x0)
04:59:02 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
04:59:02 executing program 3:
r0 = socket$inet(0x2, 0xa, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000))
04:59:02 executing program 2:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000))
[ 352.045640][ T27] audit: type=1400 audit(1699678742.815:379): avc: denied { setattr } for pid=15407 comm="syz-executor.2" path="socket:[43758]" dev="sockfs" ino=43758 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1
04:59:02 executing program 4:
bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x0, 0x40, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x48)
04:59:02 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
[ 352.130099][T15420] loop1: detected capacity change from 0 to 2048
04:59:03 executing program 2:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x8940, &(0x7f0000000600))
04:59:03 executing program 5:
openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x7da041, 0x0)
04:59:03 executing program 3:
r0 = epoll_create(0x1ff)
epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0)
04:59:03 executing program 0:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async, rerun: 64)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1) (async)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
04:59:03 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000001300)=@ipv6_newnexthop={0x20, 0x68, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x4}, [@NHA_OIF={0x8, 0x5, r1}]}, 0x20}}, 0x0)
04:59:03 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 52)
04:59:03 executing program 3:
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@map, 0xffffffffffffffff, 0x37, 0x0, 0xffffffffffffffff, @prog_id}, 0x20)
04:59:03 executing program 5:
socketpair(0x2c, 0x3, 0x3ff, &(0x7f0000000040))
[ 352.405405][T15420] syz-executor.1: attempt to access beyond end of device
[ 352.405405][T15420] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:03 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x1f00, &(0x7f0000000700)={&(0x7f0000001300)=@ipv6_newnexthop={0x40, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14, 0x3}}, @NHA_OIF={0x8, 0x5, r1}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x4}]}, 0x40}}, 0x0)
04:59:03 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x141, 0x0)
fallocate(r3, 0x11, 0xf4, 0x8010000)
fallocate(r3, 0x20, 0x0, 0xffff7fef000)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000040))
04:59:03 executing program 2:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @info_reply}}}}, 0x0)
ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000))
04:59:03 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}]}, 0x34}}, 0x0)
04:59:03 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4)
sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)="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", 0x68a}], 0x1}}], 0x1, 0x0)
r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x0, 0x0)
bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4)
sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27)
04:59:03 executing program 4:
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@map=0x1, 0x2e, 0x0, 0x0, &(0x7f0000000300)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40)
04:59:03 executing program 2:
socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff})
sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x70bd2a}, 0x14}}, 0x0)
04:59:03 executing program 3:
syz_emit_ethernet(0x1e, &(0x7f0000000100)={@local, @link_local, @void, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "a604f6cfe89aef5d"}}}}, 0x0)
04:59:03 executing program 4:
mmap$xdp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000003, 0x30, 0xffffffffffffffff, 0x0)
[ 352.540750][T15452] loop1: detected capacity change from 0 to 2048
04:59:03 executing program 3:
socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[], 0x20}}, 0x0)
04:59:03 executing program 2:
bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x0, 0x40, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x4}, 0x48)
04:59:03 executing program 4:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0})
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={@ifindex=r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
04:59:03 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 53)
04:59:03 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) (async)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x141, 0x0)
fallocate(r3, 0x11, 0xf4, 0x8010000) (async)
fallocate(r3, 0x20, 0x0, 0xffff7fef000) (async)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000040))
04:59:03 executing program 4:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4)
sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)="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", 0x83d}], 0x1}}], 0x1, 0x0)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4)
sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10)
04:59:03 executing program 3:
socketpair(0x23, 0x2, 0x0, &(0x7f0000000040))
[ 352.860839][T15452] syz-executor.1: attempt to access beyond end of device
[ 352.860839][T15452] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 352.951462][T15480] loop1: detected capacity change from 0 to 2048
[ 353.230597][T15480] syz-executor.1: attempt to access beyond end of device
[ 353.230597][T15480] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:04 executing program 4:
r0 = socket$inet6(0xa, 0x3, 0x1)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@empty}}, 0xe8)
sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0)
04:59:04 executing program 2:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x32)
04:59:04 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@gettclass={0x24, 0x2a, 0x1}, 0x24}}, 0x0)
04:59:04 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1) (async)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x141, 0x0)
fallocate(r3, 0x11, 0xf4, 0x8010000) (async)
fallocate(r3, 0x20, 0x0, 0xffff7fef000)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000040))
04:59:04 executing program 5:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x5452, &(0x7f0000000600))
04:59:04 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 54)
04:59:04 executing program 3:
r0 = socket$inet(0x2, 0x5, 0x0)
getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0)
04:59:04 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@gettaction={0x28, 0x32, 0x1, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x28}}, 0x0)
04:59:04 executing program 5:
syz_emit_ethernet(0x1e, &(0x7f0000000100)={@local, @link_local, @void, {@can={0xc, {{0x4}, 0x0, 0x0, 0x0, 0x0, "a604f6cfe89aef5d"}}}}, 0x0)
04:59:04 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0})
sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newtfilter={0x2c, 0x2c, 0x200, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x2, 0xfff2}, {0xfff2, 0xf}, {0xa, 0xfff1}}, [@TCA_CHAIN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000811)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef)
04:59:04 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet6_mreq(r0, 0x29, 0x19, &(0x7f00000000c0)={@empty}, &(0x7f0000000100)=0x14)
04:59:04 executing program 5:
r0 = socket$tipc(0x1e, 0x2, 0x0)
bind$tipc(r0, &(0x7f00000026c0)=@name, 0x10)
[ 353.442022][T15494] loop1: detected capacity change from 0 to 2048
[ 353.479925][T15507] tipc: Can't bind to reserved service type 0
[ 353.483345][ T27] audit: type=1400 audit(1699678744.255:380): avc: denied { bind } for pid=15506 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
04:59:04 executing program 4:
socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x20004880}, 0x0)
04:59:04 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:04 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x12)
04:59:04 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0})
sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) (async)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newtfilter={0x2c, 0x2c, 0x200, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x2, 0xfff2}, {0xfff2, 0xf}, {0xa, 0xfff1}}, [@TCA_CHAIN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000811) (async)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef)
04:59:04 executing program 2:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4)
sendmmsg$inet(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="a09a1b26f458c54b738c6b7718f84b27aa40682ea88c7722e77ca7fa8d102cf3ea7923b9948d7fcc0d924d108aec4d65e3a14f7a5692a06e362a3230e14522e843ad705ea48f55d1dc51753349fe323fd4586f1698f476f4ac677c19fd573430e9c415616db56f22f21f76a8a0c4937527eec7d9e40d684fd9601aed7ff0b7a616bdb4010b927079e6b03ad3e9921afc613df2bc9ba12c7928e39deba21e050ecdbd9a921562430162343d1e1d76532b7a4f2183c19dcf2989afa95bf3abe741a485b96c0d295502c6", 0xc9}], 0x1}}], 0x1, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4)
sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27)
sendto$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x4004, 0x0, 0x0)
04:59:04 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 55)
04:59:04 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={0x0, 0xffffff27}}, 0x0)
04:59:04 executing program 5:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x2, 0xfffffffffffffffc)
04:59:04 executing program 0:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1) (async)
close(r1)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0})
sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) (async)
sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newtfilter={0x2c, 0x2c, 0x200, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x2, 0xfff2}, {0xfff2, 0xf}, {0xa, 0xfff1}}, [@TCA_CHAIN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000811)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef)
04:59:04 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:04 executing program 5:
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@map=0x1, 0x2e, 0x0, 0x84f4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
04:59:04 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet6_mreq(r0, 0x29, 0x19, 0x0, &(0x7f0000000100))
04:59:04 executing program 0:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8932, &(0x7f0000000000)={'vxcan1\x00'})
[ 353.819409][T15494] syz-executor.1: attempt to access beyond end of device
[ 353.819409][T15494] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:04 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:04 executing program 5:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000600))
r1 = socket$xdp(0x2c, 0x3, 0x0)
mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x100000000)
04:59:04 executing program 4:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x40086602, &(0x7f0000000000)={'vxcan1\x00'})
[ 353.916029][T15533] loop1: detected capacity change from 0 to 2048
[ 354.214919][T15533] syz-executor.1: attempt to access beyond end of device
[ 354.214919][T15533] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:05 executing program 2:
syz_emit_ethernet(0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000005158000000000805"], 0x0)
04:59:05 executing program 0:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8922, &(0x7f0000000000)={'vxcan1\x00'})
04:59:05 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:05 executing program 5:
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@ifindex, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
04:59:05 executing program 4:
socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff})
sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x20}}, 0x0)
04:59:05 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 56)
04:59:05 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000002200)=""/4096, &(0x7f0000003200)=0x1000)
04:59:05 executing program 5:
alarm(0x3f)
04:59:05 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3b8, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418)
04:59:05 executing program 2:
socket(0x11, 0x3, 0x0)
socket$packet(0x11, 0x2, 0x300)
socket$packet(0x11, 0x2, 0x300)
04:59:05 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:05 executing program 5:
openat$tun(0xffffffffffffff9c, &(0x7f0000001a80), 0x4000, 0x0)
04:59:05 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x32, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:05 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0xc)
syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0)
04:59:05 executing program 2:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff})
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x1)
[ 354.466418][T15550] loop1: detected capacity change from 0 to 2048
[ 354.518861][T15550] FAULT_INJECTION: forcing a failure.
[ 354.518861][T15550] name failslab, interval 1, probability 0, space 0, times 0
[ 354.531607][T15550] CPU: 0 PID: 15550 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 354.541702][T15550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 354.551841][T15550] Call Trace:
[ 354.555234][T15550]
[ 354.558281][T15550] dump_stack_lvl+0xda/0x130
[ 354.563000][T15550] dump_stack+0x15/0x20
[ 354.567210][T15550] should_fail_ex+0x21f/0x230
[ 354.571952][T15550] ? iter_file_splice_write+0xeb/0x7e0
[ 354.577617][T15550] __should_failslab+0x92/0xa0
[ 354.582448][T15550] should_failslab+0x9/0x20
[ 354.587136][T15550] __kmem_cache_alloc_node+0x4e/0x210
[ 354.592558][T15550] ? splice_from_pipe+0xe0/0xe0
[ 354.597475][T15550] ? iter_file_splice_write+0xeb/0x7e0
[ 354.603173][T15550] __kmalloc+0x95/0x1a0
[ 354.607370][T15550] iter_file_splice_write+0xeb/0x7e0
[ 354.612823][T15550] ? splice_from_pipe+0xe0/0xe0
04:59:05 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:05 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x2, 0x508, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x30}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568)
[ 354.617753][T15550] direct_splice_actor+0x8a/0xb0
[ 354.622830][T15550] splice_direct_to_actor+0x31d/0x690
[ 354.627689][ T27] audit: type=1400 audit(1699678745.365:381): avc: denied { read } for pid=15569 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[ 354.628441][T15550] ? direct_file_splice_eof+0x70/0x70
[ 354.655030][T15550] do_splice_direct+0x10d/0x190
[ 354.660073][T15550] ? do_splice_direct+0x190/0x190
[ 354.665233][T15550] do_sendfile+0x3c4/0x980
[ 354.669699][T15550] __x64_sys_sendfile64+0x110/0x150
[ 354.674981][T15550] do_syscall_64+0x44/0x110
[ 354.679620][T15550] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 354.685604][T15550] RIP: 0033:0x7f8517f84ae9
[ 354.690083][T15550] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 354.709823][T15550] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
04:59:05 executing program 5:
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@cgroup, 0x4, 0x0, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100), &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x12)
04:59:05 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:05 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x541b, &(0x7f00000007c0)={0xd, 0x0, 0x0, 0x0, 0x17803})
04:59:05 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4e, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:05 executing program 2:
get_robust_list(0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080))
04:59:05 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 57)
04:59:05 executing program 2:
r0 = socket(0x11, 0x3, 0x0)
recvmsg$can_raw(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x2042)
[ 354.718384][T15550] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 354.726590][T15550] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 354.734572][T15550] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 354.742555][T15550] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 354.750533][T15550] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 354.758665][T15550]
04:59:05 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0)
04:59:05 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2e, 0x0, 0x0)
04:59:05 executing program 0:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@security={'security\x00', 0xe, 0x4, 0x370, 0xffffffff, 0x1d0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2f8, 0x2f8, 0x2f8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "2283e43fb69a522c992ae27204660631e4e081022e48053867267e159d17"}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "d269cac4236e6c314f83d5172c376bc5bc17a74188d1a6e521cb042a0402"}}}, {{@ipv6={@mcast1, @mcast1, [], [], 'dvmrp0\x00', 'vxcan1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0)
04:59:05 executing program 3:
r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:05 executing program 2:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:05 executing program 3:
r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:05 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x36, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:05 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x6, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
[ 354.836610][ T27] audit: type=1400 audit(1699678745.605:382): avc: denied { read } for pid=15590 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
04:59:05 executing program 0:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:05 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
getsockname$packet(r0, 0x0, &(0x7f0000001240))
[ 354.918291][T15603] loop1: detected capacity change from 0 to 2048
[ 354.966161][T15603] FAULT_INJECTION: forcing a failure.
[ 354.966161][T15603] name failslab, interval 1, probability 0, space 0, times 0
[ 354.979055][T15603] CPU: 0 PID: 15603 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 354.989210][T15603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 354.999431][T15603] Call Trace:
[ 355.002792][T15603]
[ 355.005724][T15603] dump_stack_lvl+0xda/0x130
[ 355.010332][T15603] dump_stack+0x15/0x20
[ 355.014501][T15603] should_fail_ex+0x21f/0x230
[ 355.019349][T15603] ? __blockdev_direct_IO+0x137/0x1f90
[ 355.024851][T15603] __should_failslab+0x92/0xa0
[ 355.029704][T15603] should_failslab+0x9/0x20
[ 355.034268][T15603] kmem_cache_alloc+0x4e/0x250
[ 355.039178][T15603] __blockdev_direct_IO+0x137/0x1f90
[ 355.044561][T15603] ? __rcu_read_unlock+0x4d/0x70
[ 355.049531][T15603] ? find_get_entries+0x397/0x410
[ 355.054629][T15603] ? fat_block_truncate_page+0x40/0x40
[ 355.060133][T15603] ? invalidate_inode_pages2_range+0x6cc/0x720
[ 355.066460][T15603] fat_direct_IO+0x110/0x1d0
[ 355.071134][T15603] generic_file_direct_write+0xab/0x1f0
[ 355.076715][T15603] ? mnt_put_write_access_file+0x95/0xb0
[ 355.082466][T15603] __generic_file_write_iter+0xae/0x120
[ 355.088149][T15603] generic_file_write_iter+0x7d/0x1c0
[ 355.093638][T15603] do_iter_write+0x4ad/0x770
[ 355.098371][T15603] ? iter_file_splice_write+0xeb/0x7e0
[ 355.103912][T15603] vfs_iter_write+0x56/0x70
[ 355.108493][T15603] iter_file_splice_write+0x462/0x7e0
[ 355.113927][T15603] ? splice_from_pipe+0xe0/0xe0
[ 355.118805][T15603] direct_splice_actor+0x8a/0xb0
[ 355.123853][T15603] splice_direct_to_actor+0x31d/0x690
[ 355.129272][T15603] ? direct_file_splice_eof+0x70/0x70
[ 355.134687][T15603] do_splice_direct+0x10d/0x190
[ 355.139714][T15603] ? do_splice_direct+0x190/0x190
[ 355.144767][T15603] do_sendfile+0x3c4/0x980
[ 355.149227][T15603] __x64_sys_sendfile64+0x110/0x150
[ 355.154502][T15603] do_syscall_64+0x44/0x110
[ 355.159095][T15603] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 355.165101][T15603] RIP: 0033:0x7f8517f84ae9
[ 355.169837][T15603] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 355.189582][T15603] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 355.198103][T15603] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 355.206140][T15603] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
04:59:06 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 58)
04:59:06 executing program 3:
r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:06 executing program 2:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1fff8, 0x0, 0x0)
04:59:06 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000000)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @multicast2, @broadcast, {[@lsrr={0x83, 0x3}]}}}}})
04:59:06 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x23, 0x0, 0x0)
04:59:06 executing program 0:
socket$netlink(0x10, 0x3, 0x6)
[ 355.214143][T15603] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 355.222128][T15603] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 355.230115][T15603] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 355.238106][T15603]
04:59:06 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:06 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x27, 0x0, 0x0)
04:59:06 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x6)
sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x6)
r0 = getpid()
sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1)
tgkill(0x0, 0x0, 0x34)
ioprio_get$pid(0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200))
getpid()
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff})
connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x2000011a)
connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xf, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x90)
sched_setaffinity(0x0, 0x8, &(0x7f0000000180))
write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0)
openat$loop_ctrl(0xffffff9c, &(0x7f0000001280), 0x0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0xd, 0x0, 0x0, 0x20040006, 0x17803})
04:59:06 executing program 0:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', 0x0})
04:59:06 executing program 5:
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00'})
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=',\x00'}, 0x47)
[ 355.290093][T15623] loop1: detected capacity change from 0 to 2048
04:59:06 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:06 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 59)
04:59:06 executing program 0:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x42, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:06 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x8000000, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:06 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:06 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}})
04:59:06 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, 0x0, 0x0)
04:59:06 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x3b0, 0xffffffff, 0x248, 0xc0, 0x248, 0xffffffff, 0xffffffff, 0x438, 0x438, 0x438, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@dscp={{0x28}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@uncond, 0x0, 0x128, 0x188, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8}, {{@ipv4=@multicast1, [], @ipv4=@multicast2, [], @ipv6=@local, [], @ipv4=@dev}}}]}, @common=@CLUSTERIP={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410)
04:59:06 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
[ 355.593189][T15623] syz-executor.1: attempt to access beyond end of device
[ 355.593189][T15623] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 355.692116][T15653] loop1: detected capacity change from 0 to 2048
[ 355.954731][T15653] syz-executor.1: attempt to access beyond end of device
[ 355.954731][T15653] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:06 executing program 3:
socket$nl_generic(0x10, 0x3, 0x10)
r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:06 executing program 0:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2a, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:06 executing program 2:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x23, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:06 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x35, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:06 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 60)
04:59:06 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000005200)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000000)={0x10}, 0x10}, {&(0x7f00000003c0)={0x10, 0x38, 0x305}, 0x10}], 0x2}, 0x0)
04:59:06 executing program 3:
socket$nl_generic(0x10, 0x3, 0x10)
r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:06 executing program 2:
bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48)
04:59:07 executing program 0:
r0 = socket(0x11, 0x3, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0x9, 0x0, 0x0)
04:59:07 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x4, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:07 executing program 2:
r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0)
04:59:07 executing program 2:
r0 = socket$nl_audit(0x10, 0x3, 0x9)
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000140), 0x4)
04:59:07 executing program 3:
socket$nl_generic(0x10, 0x3, 0x10)
r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
[ 356.241187][T15671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15671 comm=syz-executor.4
[ 356.254055][T15671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=15671 comm=syz-executor.4
04:59:07 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x33, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:07 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, 0x0, 0x0)
04:59:07 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x2, 0x40, 0x0, 0x0)
[ 356.294239][T15669] loop1: detected capacity change from 0 to 2048
04:59:07 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x23, 0x4)
04:59:07 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 61)
04:59:07 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, 0x0, 0x0)
04:59:07 executing program 5:
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@ifindex, 0xffffffffffffffff, 0x5, 0x0, 0x0, @link_id}, 0x20)
04:59:07 executing program 2:
socket(0x1, 0x3, 0x8)
04:59:07 executing program 0:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000540)=[{}], &(0x7f0000000580)=0x8)
04:59:07 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0)
04:59:07 executing program 0:
syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000002c0)='ns/user\x00')
[ 356.591249][T15669] syz-executor.1: attempt to access beyond end of device
[ 356.591249][T15669] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:07 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, 0x0, 0x0)
04:59:07 executing program 2:
mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x20088, 0x0)
04:59:07 executing program 0:
syz_clone(0x4a00000, 0x0, 0x0, 0x0, 0x0, 0x0)
04:59:07 executing program 4:
r0 = socket(0x11, 0x3, 0x0)
connect$netlink(r0, &(0x7f0000000000), 0xc)
04:59:07 executing program 4:
r0 = socket(0x11, 0x3, 0x0)
recvmsg$can_raw(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0)
[ 356.679910][T15704] loop1: detected capacity change from 0 to 2048
04:59:07 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0)
04:59:07 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 62)
04:59:07 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3b8, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20}}]}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410)
04:59:07 executing program 0:
r0 = socket(0x11, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0)
04:59:07 executing program 5:
sync()
socket$inet6_udplite(0xa, 0x2, 0x88)
04:59:07 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x2, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:07 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0)
[ 356.967494][T15704] syz-executor.1: attempt to access beyond end of device
[ 356.967494][T15704] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:07 executing program 0:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000740)=[{}], 0x8)
04:59:07 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3b0, 0x150, 0x308, 0x150, 0x150, 0x150, 0x1e8, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20}}]}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410)
04:59:07 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0)
04:59:07 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0)
[ 357.067652][T15730] loop1: detected capacity change from 0 to 2048
[ 357.093909][ T27] audit: type=1400 audit(1699678747.865:383): avc: denied { setopt } for pid=15732 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[ 357.346276][T15730] syz-executor.1: attempt to access beyond end of device
[ 357.346276][T15730] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:08 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x15, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:08 executing program 5:
sync()
socket$inet6_udplite(0xa, 0x2, 0x88)
04:59:08 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0)
04:59:08 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
getsockopt$netlink(r0, 0x10e, 0x3, 0x0, &(0x7f0000000000)=0xe)
04:59:08 executing program 2:
r0 = socket$nl_audit(0x10, 0x3, 0x9)
setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x1c, 0x4)
04:59:08 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 63)
04:59:08 executing program 0:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:08 executing program 4:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff})
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c}, 0x1c}}, 0x1)
04:59:08 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@mpls_newroute={0x1c, 0x18, 0x2a3f1e67312923a5}, 0x1c}}, 0x0)
04:59:08 executing program 0:
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={@map, 0xffffffffffffffff, 0x21, 0x0, 0xffffffffffffffff, @link_id}, 0x20)
04:59:08 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0)
04:59:08 executing program 5:
sync()
socket$inet6_udplite(0xa, 0x2, 0x88)
[ 357.595755][ T27] audit: type=1400 audit(1699678748.365:384): avc: denied { audit_read } for pid=15741 comm="syz-executor.2" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 357.632962][T15749] loop1: detected capacity change from 0 to 2048
04:59:08 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:08 executing program 0:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
recvmsg$can_raw(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000001d80)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x2000)
04:59:08 executing program 4:
syz_open_dev$vcsn(&(0x7f0000000140), 0x0, 0x511482)
04:59:08 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xf, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:08 executing program 0:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x2041)
[ 357.700287][T15749] FAULT_INJECTION: forcing a failure.
[ 357.700287][T15749] name failslab, interval 1, probability 0, space 0, times 0
[ 357.713188][T15749] CPU: 0 PID: 15749 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 357.723460][T15749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 357.733669][T15749] Call Trace:
[ 357.737014][T15749]
[ 357.739965][T15749] dump_stack_lvl+0xda/0x130
[ 357.744612][T15749] dump_stack+0x15/0x20
[ 357.748809][T15749] should_fail_ex+0x21f/0x230
[ 357.753557][T15749] ? iter_file_splice_write+0xeb/0x7e0
[ 357.759063][T15749] __should_failslab+0x92/0xa0
[ 357.764019][T15749] should_failslab+0x9/0x20
[ 357.768573][T15749] __kmem_cache_alloc_node+0x4e/0x210
[ 357.774053][T15749] ? splice_from_pipe+0xe0/0xe0
[ 357.778944][T15749] ? iter_file_splice_write+0xeb/0x7e0
[ 357.784545][T15749] __kmalloc+0x95/0x1a0
[ 357.788767][T15749] iter_file_splice_write+0xeb/0x7e0
[ 357.794128][T15749] ? splice_from_pipe+0xe0/0xe0
[ 357.799046][T15749] direct_splice_actor+0x8a/0xb0
[ 357.804097][T15749] splice_direct_to_actor+0x31d/0x690
[ 357.809573][T15749] ? direct_file_splice_eof+0x70/0x70
[ 357.815104][T15749] do_splice_direct+0x10d/0x190
[ 357.820183][T15749] ? do_splice_direct+0x190/0x190
[ 357.825356][T15749] do_sendfile+0x3c4/0x980
[ 357.829982][T15749] __x64_sys_sendfile64+0x110/0x150
[ 357.830092][ T27] audit: type=1400 audit(1699678748.495:385): avc: denied { read } for pid=15767 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[ 357.835377][T15749] do_syscall_64+0x44/0x110
[ 357.859658][T15749] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 357.865672][T15749] RIP: 0033:0x7f8517f84ae9
[ 357.870135][T15749] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 357.889827][T15749] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
04:59:08 executing program 2:
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001280)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0x0, @prog_id}, 0x20)
04:59:08 executing program 5:
sync()
socket$inet6_udplite(0xa, 0x2, 0x88)
04:59:08 executing program 4:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r1)
sendmsg$NFC_CMD_GET_SE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r2, 0x301}, 0x14}}, 0x0)
04:59:08 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x9, 0x3, 0x260, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x1e8, 0xffffffff, 0xffffffff, 0x1e8, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@uncond, 0x0, 0xc8, 0x130, 0x0, {}, [@common=@ah={{0x30}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x98, 0x0, {}, [@inet]}, @unspec}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x253)
04:59:08 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 64)
04:59:08 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
[ 357.898344][T15749] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 357.906514][T15749] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 357.914496][T15749] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 357.922487][T15749] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 357.930559][T15749] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 357.938542][T15749]
04:59:08 executing program 2:
socket$inet_udp(0x2, 0x2, 0x0)
pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000200)={0x9}, 0x0, 0x0, 0x0)
04:59:08 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x1e8, 0xffffffff, 0xffffffff, 0x1e8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x260)
04:59:08 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:08 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000002a00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x300, &(0x7f0000002900)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x20}, 0x0)
04:59:08 executing program 0:
r0 = socket(0x11, 0x3, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0x5, 0x0, 0x0)
04:59:08 executing program 2:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, &(0x7f0000000540))
04:59:08 executing program 4:
socket(0x2, 0x2, 0x8)
04:59:08 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @local}}}})
04:59:08 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:08 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
[ 358.027290][T15789] loop1: detected capacity change from 0 to 2048
[ 358.096062][T15789] FAULT_INJECTION: forcing a failure.
[ 358.096062][T15789] name failslab, interval 1, probability 0, space 0, times 0
[ 358.109060][T15789] CPU: 1 PID: 15789 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 358.119163][T15789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 358.129639][T15789] Call Trace:
[ 358.132959][T15789]
[ 358.135922][T15789] dump_stack_lvl+0xda/0x130
[ 358.140854][T15789] dump_stack+0x15/0x20
[ 358.145102][T15789] should_fail_ex+0x21f/0x230
[ 358.149878][T15789] ? __blockdev_direct_IO+0x137/0x1f90
[ 358.155409][T15789] __should_failslab+0x92/0xa0
[ 358.160282][T15789] should_failslab+0x9/0x20
[ 358.165115][T15789] kmem_cache_alloc+0x4e/0x250
[ 358.170177][T15789] __blockdev_direct_IO+0x137/0x1f90
[ 358.175622][T15789] ? __rcu_read_unlock+0x4d/0x70
[ 358.180913][T15789] ? find_get_entries+0x397/0x410
[ 358.185980][T15789] ? fat_block_truncate_page+0x40/0x40
[ 358.191659][T15789] ? invalidate_inode_pages2_range+0x6cc/0x720
[ 358.197841][T15789] fat_direct_IO+0x110/0x1d0
[ 358.202477][T15789] generic_file_direct_write+0xab/0x1f0
[ 358.208205][T15789] ? mnt_put_write_access_file+0x95/0xb0
[ 358.213931][T15789] __generic_file_write_iter+0xae/0x120
[ 358.219504][T15789] generic_file_write_iter+0x7d/0x1c0
[ 358.224887][T15789] do_iter_write+0x4ad/0x770
[ 358.229529][T15789] ? iter_file_splice_write+0xeb/0x7e0
[ 358.235183][T15789] vfs_iter_write+0x56/0x70
[ 358.239733][T15789] iter_file_splice_write+0x462/0x7e0
[ 358.245143][T15789] ? splice_from_pipe+0xe0/0xe0
[ 358.250057][T15789] direct_splice_actor+0x8a/0xb0
[ 358.255059][T15789] splice_direct_to_actor+0x31d/0x690
[ 358.260459][T15789] ? direct_file_splice_eof+0x70/0x70
[ 358.265922][T15789] do_splice_direct+0x10d/0x190
[ 358.270835][T15789] ? do_splice_direct+0x190/0x190
[ 358.275988][T15789] do_sendfile+0x3c4/0x980
[ 358.280440][T15789] __x64_sys_sendfile64+0x110/0x150
[ 358.285662][T15789] do_syscall_64+0x44/0x110
[ 358.290322][T15789] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 358.296382][T15789] RIP: 0033:0x7f8517f84ae9
[ 358.300799][T15789] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 358.320617][T15789] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 358.329102][T15789] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 358.337250][T15789] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
04:59:09 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 65)
04:59:09 executing program 2:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x548, 0x238, 0x3f8, 0x308, 0x3f8, 0x238, 0x518, 0x518, 0x518, 0x518, 0x518, 0x6, 0x0, {[{{@ipv6={@dev, @private1, [], [], 'team0\x00', 'veth1\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv6=@remote}}}, {{@ipv6={@loopback, @local, [], [], 'veth1_macvtap\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'bridge0\x00', 'wg0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@local}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a8)
04:59:09 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:09 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
getsockopt$netlink(r0, 0x10e, 0xc, 0x0, &(0x7f0000000740)=0x4)
04:59:09 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2, 0x0, 0x0)
04:59:09 executing program 0:
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@ifindex, 0xffffffffffffffff, 0x3, 0x0, 0x0, @prog_id}, 0x20)
[ 358.345226][T15789] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 358.353239][T15789] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 358.361279][T15789] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 358.369328][T15789]
04:59:09 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@mpls_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0)
04:59:09 executing program 0:
socket$inet6(0xa, 0x80801, 0x6)
04:59:09 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000000)=""/9, &(0x7f0000000080)=0x9)
04:59:09 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0)
04:59:09 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x10, 0x0, 0x0)
04:59:09 executing program 0:
openat$pidfd(0xffffffffffffff9c, &(0x7f0000002440), 0x40, 0x0)
[ 358.465156][T15828] loop1: detected capacity change from 0 to 2048
04:59:09 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 66)
04:59:09 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}]}, 0x2c}}, 0x0)
04:59:09 executing program 0:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:09 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000002a00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1, &(0x7f0000002900)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x20}, 0x0)
04:59:09 executing program 2:
r0 = socket(0x11, 0x3, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0x2, 0x0, 0x0)
04:59:09 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3b, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:09 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {0xa}, [@NDA_LINK_NETNSID={0x8}]}, 0x24}}, 0x0)
04:59:09 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:09 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x13, 0x0, 0x0)
[ 358.755698][T15828] syz-executor.1: attempt to access beyond end of device
[ 358.755698][T15828] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:09 executing program 5:
r0 = socket(0x11, 0x3, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0x40, 0x0, 0x0)
04:59:09 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}]}, 0x2c}}, 0x0)
04:59:09 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000002a00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1, &(0x7f0000002900)=[@cred={{0xf, 0x1, 0x2, {0xffffffffffffffff}}}], 0x20}, 0x0)
[ 358.886641][T15856] loop1: detected capacity change from 0 to 2048
04:59:09 executing program 0:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000001c0)="a3", &(0x7f00000007c0)="1e"}, 0x50)
04:59:09 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, 0x0, 0x2)
04:59:09 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 67)
04:59:09 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}]}, 0x2c}}, 0x0)
04:59:09 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1a, 0x0, 0x0)
04:59:09 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2c, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:09 executing program 0:
syz_open_dev$vcsn(&(0x7f0000000780), 0x0, 0x0)
times(&(0x7f0000000040))
[ 359.138460][T15856] syz-executor.1: attempt to access beyond end of device
[ 359.138460][T15856] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:09 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip_vti0\x00', 0x0})
04:59:09 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x2f8, 0xffffffff, 0x248, 0xc0, 0x248, 0xffffffff, 0xffffffff, 0x438, 0x438, 0x438, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@dscp={{0x28}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x358)
04:59:09 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x30, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x30}}, 0x0)
04:59:10 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@bridge_getneigh={0x20}, 0x20}}, 0x0)
04:59:10 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x7, 0x0, 0x0)
[ 359.225693][T15876] loop1: detected capacity change from 0 to 2048
04:59:10 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 68)
04:59:10 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xa, 0x0, 0x0)
04:59:10 executing program 5:
syz_clone(0xd000000, 0x0, 0x0, 0x0, 0x0, 0x0)
04:59:10 executing program 2:
r0 = socket$nl_audit(0x10, 0x3, 0x9)
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000140)=0x1f, 0x4)
04:59:10 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2f, 0x0, 0x0)
04:59:10 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x18}}, 0x0)
04:59:10 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x48, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:10 executing program 0:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000540)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={0x0}}, 0x0)
04:59:10 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x18}}, 0x0)
[ 359.533180][T15876] syz-executor.1: attempt to access beyond end of device
[ 359.533180][T15876] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:10 executing program 2:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x200005e8, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x30}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568)
04:59:10 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xfffffffffffffd99)
04:59:10 executing program 5:
r0 = socket(0x11, 0x3, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0x11, 0x0, 0x0)
[ 359.645843][T15906] loop1: detected capacity change from 0 to 2048
04:59:10 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 69)
04:59:10 executing program 4:
r0 = syz_open_dev$vcsn(&(0x7f0000000480), 0x0, 0x0)
connect$netlink(r0, 0x0, 0x0)
04:59:10 executing program 0:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:10 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x18}}, 0x0)
04:59:10 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:10 executing program 5:
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48)
04:59:10 executing program 0:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)="1e"}, 0x50)
04:59:10 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x508, 0x438, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x30}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568)
[ 359.926862][T15906] syz-executor.1: attempt to access beyond end of device
[ 359.926862][T15906] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:10 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x3, &(0x7f0000000600)=@framed, &(0x7f0000000540)='syzkaller\x00'}, 0x90)
04:59:10 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x4}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x1c}}, 0x0)
04:59:10 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
getsockopt$netlink(r0, 0x10e, 0xc, 0x0, &(0x7f0000000740))
04:59:10 executing program 4:
socket(0x11, 0x3, 0x0)
socket$packet(0x11, 0x2, 0x300)
[ 360.031570][T15934] x_tables: duplicate underflow at hook 1
[ 360.057340][T15929] loop1: detected capacity change from 0 to 2048
04:59:11 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'tunl0\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x9, 0x0, 0x0, @multicast2, @remote}}}})
04:59:11 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 70)
04:59:11 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0)
04:59:11 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {0xa}, [@NDA_LINK_NETNSID={0x8}]}, 0x24}}, 0x0)
04:59:11 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x4}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x1c}}, 0x0)
04:59:11 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x32, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
[ 360.327588][T15929] syz-executor.1: attempt to access beyond end of device
[ 360.327588][T15929] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:11 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:11 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x4}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x1c}}, 0x0)
04:59:11 executing program 0:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0)
04:59:11 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:11 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$netlink(r0, &(0x7f0000006840)={0x0, 0x0, &(0x7f0000006780)=[{&(0x7f0000000c40)={0x10}, 0x10}, {&(0x7f00000060c0)={0x10, 0x0, 0x1}, 0x10}], 0x2}, 0x0)
04:59:11 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @multicast2}}}})
[ 360.473598][T15956] loop1: detected capacity change from 0 to 2048
[ 360.488057][T15956] FAULT_INJECTION: forcing a failure.
[ 360.488057][T15956] name failslab, interval 1, probability 0, space 0, times 0
[ 360.500849][T15956] CPU: 1 PID: 15956 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 360.511031][T15956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 360.521144][T15956] Call Trace:
[ 360.524424][T15956]
[ 360.527490][T15956] dump_stack_lvl+0xda/0x130
[ 360.532096][T15956] dump_stack+0x15/0x20
[ 360.536288][T15956] should_fail_ex+0x21f/0x230
[ 360.541108][T15956] ? iter_file_splice_write+0xeb/0x7e0
[ 360.546663][T15956] __should_failslab+0x92/0xa0
[ 360.551524][T15956] should_failslab+0x9/0x20
[ 360.556038][T15956] __kmem_cache_alloc_node+0x4e/0x210
[ 360.561442][T15956] ? splice_from_pipe+0xe0/0xe0
[ 360.566311][T15956] ? iter_file_splice_write+0xeb/0x7e0
[ 360.571808][T15956] __kmalloc+0x95/0x1a0
[ 360.576085][T15956] iter_file_splice_write+0xeb/0x7e0
[ 360.581404][T15956] ? splice_from_pipe+0xe0/0xe0
[ 360.586377][T15956] direct_splice_actor+0x8a/0xb0
[ 360.591472][T15956] splice_direct_to_actor+0x31d/0x690
[ 360.596942][T15956] ? direct_file_splice_eof+0x70/0x70
[ 360.602403][T15956] do_splice_direct+0x10d/0x190
[ 360.607488][T15956] ? do_splice_direct+0x190/0x190
[ 360.612648][T15956] do_sendfile+0x3c4/0x980
[ 360.617147][T15956] __x64_sys_sendfile64+0x110/0x150
[ 360.622380][T15956] do_syscall_64+0x44/0x110
[ 360.627002][T15956] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 360.632918][T15956] RIP: 0033:0x7f8517f84ae9
[ 360.637402][T15956] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 360.657201][T15956] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 360.665640][T15956] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
04:59:11 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x1fffffbf, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20}}]}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410)
04:59:11 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x12, 0x0, 0x0)
04:59:11 executing program 4:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x50)
04:59:11 executing program 2:
r0 = socket$packet(0x11, 0x2, 0x300)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0)
04:59:11 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 71)
04:59:11 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x18, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:11 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x23, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:11 executing program 5:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0)
[ 360.673714][T15956] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 360.681727][T15956] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 360.689888][T15956] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 360.697959][T15956] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 360.706074][T15956]
04:59:11 executing program 3:
r0 = socket(0x11, 0x3, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0xc, 0x0, 0x0)
04:59:11 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)=[{0x0, 0x220}], 0x1, &(0x7f00000017c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20}, 0x0)
04:59:11 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:11 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000400), 0x1, 0x4902)
[ 360.850169][T15975] loop1: detected capacity change from 0 to 2048
[ 360.868100][T15975] FAULT_INJECTION: forcing a failure.
[ 360.868100][T15975] name failslab, interval 1, probability 0, space 0, times 0
[ 360.880835][T15975] CPU: 0 PID: 15975 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 360.891014][T15975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 360.901204][T15975] Call Trace:
[ 360.904656][T15975]
[ 360.907750][T15975] dump_stack_lvl+0xda/0x130
[ 360.912390][T15975] dump_stack+0x15/0x20
[ 360.916747][T15975] should_fail_ex+0x21f/0x230
[ 360.921562][T15975] ? __blockdev_direct_IO+0x137/0x1f90
[ 360.927231][T15975] __should_failslab+0x92/0xa0
[ 360.932075][T15975] should_failslab+0x9/0x20
[ 360.936667][T15975] kmem_cache_alloc+0x4e/0x250
[ 360.941574][T15975] __blockdev_direct_IO+0x137/0x1f90
[ 360.947007][T15975] ? __rcu_read_unlock+0x4d/0x70
[ 360.952060][T15975] ? find_get_entries+0x397/0x410
[ 360.957167][T15975] ? fat_block_truncate_page+0x40/0x40
[ 360.962824][T15975] ? invalidate_inode_pages2_range+0x6cc/0x720
[ 360.969034][T15975] fat_direct_IO+0x110/0x1d0
[ 360.973668][T15975] generic_file_direct_write+0xab/0x1f0
[ 360.979519][T15975] ? mnt_put_write_access_file+0x95/0xb0
[ 360.985345][T15975] __generic_file_write_iter+0xae/0x120
[ 360.991163][T15975] generic_file_write_iter+0x7d/0x1c0
[ 360.996581][T15975] do_iter_write+0x4ad/0x770
[ 361.001352][T15975] ? iter_file_splice_write+0xeb/0x7e0
[ 361.006862][T15975] vfs_iter_write+0x56/0x70
[ 361.011414][T15975] iter_file_splice_write+0x462/0x7e0
[ 361.016979][T15975] ? splice_from_pipe+0xe0/0xe0
[ 361.021891][T15975] direct_splice_actor+0x8a/0xb0
[ 361.027068][T15975] splice_direct_to_actor+0x31d/0x690
[ 361.032569][T15975] ? direct_file_splice_eof+0x70/0x70
[ 361.038011][T15975] do_splice_direct+0x10d/0x190
[ 361.042912][T15975] ? do_splice_direct+0x190/0x190
[ 361.048014][T15975] do_sendfile+0x3c4/0x980
[ 361.052464][T15975] __x64_sys_sendfile64+0x110/0x150
[ 361.057691][T15975] do_syscall_64+0x44/0x110
[ 361.062229][T15975] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 361.068247][T15975] RIP: 0033:0x7f8517f84ae9
[ 361.072703][T15975] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 361.092496][T15975] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 361.101050][T15975] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 361.109239][T15975] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 361.117274][T15975] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 361.125272][T15975] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 361.133263][T15975] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 361.141272][T15975]
[ 361.561294][T15959] syz-executor.0 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000
[ 361.572711][T15959] CPU: 1 PID: 15959 Comm: syz-executor.0 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 361.582871][T15959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 361.592939][T15959] Call Trace:
[ 361.596488][T15959]
[ 361.599443][T15959] dump_stack_lvl+0xda/0x130
[ 361.604050][T15959] dump_stack+0x15/0x20
[ 361.608287][T15959] dump_header+0x82/0x2d0
[ 361.612727][T15959] oom_kill_process+0x33a/0x4c0
[ 361.617677][T15959] out_of_memory+0x9ca/0xbf0
[ 361.622305][T15959] ? try_to_free_mem_cgroup_pages+0x220/0x480
[ 361.628391][T15959] mem_cgroup_out_of_memory+0x139/0x190
[ 361.634048][T15959] try_charge_memcg+0x75c/0xd30
[ 361.639121][T15959] ? __swap_duplicate+0x29b/0x2b0
[ 361.644228][T15959] ? radix_tree_lookup+0xf9/0x150
[ 361.649273][T15959] mem_cgroup_swapin_charge_folio+0x107/0x190
[ 361.655449][T15959] __read_swap_cache_async+0x2f6/0x550
[ 361.661017][T15959] swap_cluster_readahead+0x27c/0x4c0
[ 361.666468][T15959] swapin_readahead+0xe9/0x7f0
[ 361.671377][T15959] ? __filemap_get_folio+0x41a/0x5a0
[ 361.676770][T15959] ? __perf_event_task_sched_in+0x769/0x790
[ 361.682704][T15959] ? swap_cache_get_folio+0x6e/0x200
[ 361.688134][T15959] do_swap_page+0x4a0/0x1670
[ 361.692776][T15959] ? __rcu_read_lock+0x35/0x50
[ 361.697635][T15959] ? pte_offset_map_nolock+0x124/0x1d0
[ 361.703147][T15959] handle_mm_fault+0xa36/0x2dd0
[ 361.708341][T15959] ? mt_find+0x1d9/0x310
[ 361.712694][T15959] exc_page_fault+0x2f7/0x6c0
[ 361.717456][T15959] asm_exc_page_fault+0x26/0x30
[ 361.722353][T15959] RIP: 0010:__get_user_8+0x11/0x20
[ 361.727627][T15959] Code: 48 c1 fa 3f 48 09 d0 0f 01 cb 8b 10 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 89 c2 48 c1 fa 3f 48 09 d0 0f 01 cb <48> 8b 10 31 c0 0f 01 ca c3 66 0f 1f 44 00 00 f3 0f 1e fa 0f 01 cb
[ 361.747320][T15959] RSP: 0018:ffffc90000adfe38 EFLAGS: 00050202
[ 361.753391][T15959] RAX: 0000555556682da8 RBX: ffffc90000adfe40 RCX: ffffffff81443343
[ 361.761436][T15959] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88813c5c09d0
[ 361.769412][T15959] RBP: ffffc90000adfef8 R08: 000188813c5c09d7 R09: 0000000000000000
[ 361.777400][T15959] R10: 0001ffffffffffff R11: 000188813c5c0690 R12: ffff88813c5c0000
[ 361.785445][T15959] R13: ffff88813c5c09d0 R14: ffffc90000adff58 R15: ffffc90000adffd8
[ 361.793528][T15959] ? __rseq_handle_notify_resume+0xb3/0xbf0
[ 361.799796][T15959] __rseq_handle_notify_resume+0xc7/0xbf0
[ 361.805719][T15959] ? mem_cgroup_handle_over_high+0x2c/0x1b0
[ 361.811779][T15959] exit_to_user_mode_loop+0xcc/0xe0
[ 361.816996][T15959] exit_to_user_mode_prepare+0x6c/0xb0
[ 361.822594][T15959] irqentry_exit_to_user_mode+0x9/0x20
[ 361.828170][T15959] irqentry_exit+0x12/0x40
[ 361.832611][T15959] asm_exc_page_fault+0x26/0x30
[ 361.837515][T15959] RIP: 0033:0x7fa99619bea3
[ 361.841950][T15959] Code: 00 00 00 00 00 66 90 31 c0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 <80> 3d 4e 40 0d 00 00 74 14 b8 e6 00 00 00 0f 05 f7 d8 c3 66 2e 0f
[ 361.861674][T15959] RSP: 002b:00007ffec50c71d8 EFLAGS: 00010293
[ 361.867863][T15959] RAX: 00000000fffffffa RBX: 00007fa99628ff80 RCX: 0000000000000000
[ 361.876116][T15959] RDX: 00007ffec50c71f0 RSI: 0000000000000000 RDI: 0000000000000000
[ 361.884125][T15959] RBP: 00007fa996291980 R08: 0000000000000010 R09: 00007ffec51e00b0
[ 361.892109][T15959] R10: 0000000000000000 R11: 0000000000010f4c R12: 000000000005843e
[ 361.900217][T15959] R13: ffffffffffffffff R14: 00007fa995cf4000 R15: 00000000000580fd
[ 361.908198][T15959]
[ 361.911700][T15959] memory: usage 307200kB, limit 307200kB, failcnt 148
[ 361.918610][T15959] memory+swap: usage 307440kB, limit 9007199254740988kB, failcnt 0
[ 361.926560][T15959] kmem: usage 307184kB, limit 9007199254740988kB, failcnt 0
[ 361.933953][T15959] Memory cgroup stats for /syz0:
[ 361.934130][T15959] cache 8192
[ 361.942632][T15959] rss 8192
[ 361.945656][T15959] shmem 0
[ 361.948621][T15959] mapped_file 0
[ 361.952264][T15959] dirty 0
[ 361.955222][T15959] writeback 4096
[ 361.958837][T15959] workingset_refault_anon 28
[ 361.963520][T15959] workingset_refault_file 8
[ 361.968260][T15959] swap 245760
[ 361.971553][T15959] swapcached 8192
[ 361.975264][T15959] pgpgin 50665
[ 361.978695][T15959] pgpgout 50661
[ 361.982162][T15959] pgfault 76504
[ 361.985640][T15959] pgmajfault 13
[ 361.989141][T15959] inactive_anon 0
[ 361.992795][T15959] active_anon 0
[ 361.996388][T15959] inactive_file 8192
[ 362.000302][T15959] active_file 0
[ 362.003799][T15959] unevictable 0
[ 362.007279][T15959] hierarchical_memory_limit 314572800
[ 362.012652][T15959] hierarchical_memsw_limit 9223372036854771712
[ 362.019202][T15959] total_cache 8192
[ 362.023000][T15959] total_rss 8192
[ 362.026584][T15959] total_shmem 0
[ 362.030054][T15959] total_mapped_file 0
[ 362.034239][T15959] total_dirty 0
[ 362.037732][T15959] total_writeback 4096
[ 362.041831][T15959] total_workingset_refault_anon 28
[ 362.047123][T15959] total_workingset_refault_file 8
[ 362.052163][T15959] total_swap 245760
[ 362.055964][T15959] total_swapcached 8192
[ 362.060149][T15959] total_pgpgin 50665
[ 362.064068][T15959] total_pgpgout 50661
[ 362.068229][T15959] total_pgfault 76504
[ 362.072284][T15959] total_pgmajfault 13
[ 362.076304][T15959] total_inactive_anon 0
[ 362.080487][T15959] total_active_anon 0
[ 362.084543][T15959] total_inactive_file 8192
[ 362.088999][T15959] total_active_file 0
[ 362.093060][T15959] total_unevictable 0
[ 362.097070][T15959] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=15959,uid=0
[ 362.112615][T15959] Memory cgroup out of memory: Killed process 15959 (syz-executor.0) total-vm:46296kB, anon-rss:380kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000
04:59:13 executing program 0:
openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x672040, 0x0)
04:59:13 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)={0x3f8, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}, @nested={0xd9, 0x0, 0x0, 0x1, [@generic="a21fa5e4d3ff2a482e149ec29020", @generic="1a702e2b7ded89c364ccff1e8faf4578cfe46cac3ba5fd67683579eb81a7290829c93502a53b33b6b6c3e02f2243073d826ede7ad943e319284caf1d6417647a835f25c8717b5d5963804377d81b0b64ca919b5ec7ab81abd2", @generic="a4ef9641ea194f2b19e0f4544ac4c6a444518e3523053894f309ff01ad9d0e9d62db13fc1fe4c74dd449b936934eed3bfa203d28857573b23412dda6bd1fa6fe81a5e559da683986053335b8aae955fdea758e90c1da2341fa97eefc4747c7142da7b904d52477fd5fcb0b57bf49"]}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @nested={0xfd, 0x0, 0x0, 0x1, [@generic="5eedd553b09f965c1bd9e8481327e9e495827ba126a098acf66355e2cb6e0b72c823e48bca04273ab0c10e8ef1ebc5bb17b3dcf332803c9b0c26a2", @generic="bac9fa568608c56cc3e077b2d708230b653041438037410a55e0ee89c7a38a8009e459f1013fb14b075c2baaf917bb3efdd16598cbda77df0d8dcf0694517bdfc2246f45be7707ea729a1da700ba075c7710199435d1295b4abd9ff169105b5a67c935abec75c39a62fd58ef87ed3fdd67f3d154420b6bcc3e97f070ecfd80b51d1960b7205c88c7903b31e8fb8167dc314960868b2f7950fd6bcd976b734f0c83af7db44085f0177b6f89f08ce6efa08edd08f02154", @typed={0x8, 0x0, 0x0, 0x0, @fd}]}, @nested={0x110, 0x0, 0x0, 0x1, [@typed={0x4}, @typed={0x4}, @typed={0xdd, 0x0, 0x0, 0x0, @binary="1c075eff39fc95c01b93633fb73e5f76d0694fc6b960f48fd961af3ab3eeb30fd29e1ecb74796b1899cbbc3588a89783db1f0bfceff448115347c379390aab91b9e3153b10f0ece88030b3a89cc3e33471be20573f3bd83c0fabc9283879344d2a84a616e69ac350ef46f988c5c96be446a35eaa6aa96f4d70355ddaf5b81c6ea852d05d8905a7b79d73e1df674ac8efd6b2a1f8eda5d71a649d5535ffc1a16b75fdaa914ce090538210fb43bc5d39461c82ef7c1902105e7ca79417f349aa9e495e06c29f8c426d1a131670c55e22c870d3e47244149eb689"}, @typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}, @nested={0xe5, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="0da59d09d17e7edd11e7ef5905361cc0066df79636896ea0db22afcbe77b9190e2d09fdc709d4874ad0f9197f9b25443102b5b74cb063fd7ee629ac0721a46648cb8b1001dbecd3368ff08e7da749bf6a32432bfe126234474c3433583e72d7dc32ce1890a974d6a773fa2487daea1100eff", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @generic="32434a78248376c0d15b0d7b2abb3e8588e0472a5466786779c0e9cb35aa4f4858c0e08aa4a21c45f9d04318078603244cabd6a94ca48159f58b7b44f4523f34415515d17aef2273eaf8730eb500d3d318e10d5e", @generic="79d1a8"]}]}, 0x3f8}, {&(0x7f0000000780)={0x1274, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x1261, 0x0, 0x0, 0x1, [@generic="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", @typed={0x4}, @generic="71a0d9a325680b291c44cc6318605826b9c187fd9ea9f2289f1fcf9767db673566a9b9d519641e34c8fa4020c786f315a416e55888dc72ef329c1ea69f48e46ce0c81e6e028293ed3632144947743e85a7335d8d512b5771f42f7fd17386842cb4ea09ff3f3ec6cf0b0a6644817295ffe76214351d35512c54f7eb447b824663938202723bbc304cb7078696be180a814b8f", @generic="c257e341375ffbf8b2fc46110991940646f4c37605f7741ca59cf3e61d4caf7cfe8e1a32e443c108f5ace89672ad126ddf871a6fbe34cdb27a398ac977e2c21b07312530dafa34a9f485d7621f519d9ca3aa44c945bd0fee072da631f2c8374ad08d2ecc2ac7443133ee057d5878e8925b24cf63547c24591ce7ca91e9ec456bbaa7c793884cf392781c2ee666594752845c9ac079730533ecbbe4bb730d557c9228f8653b2e07cfca7e51d3227cf51069cbc2f9397afc381d504f1c7d7103d6e91abc4b97dca2f51e5660d03163a0a80e9fe915e898865309f1622da3da4bc86e8475398ffc", @generic="aa9660edd146a61a8ae90b0308def78d407d294c7570a3b2c71eaeed56d8c01e21c82f15abc5b4b922c3cc876f1310a1ed49271ebb87c2edbf5bd0bde195c62d6a4e41124019517e2daead0c7308e192b9b8b5371262cd0bbb85018925c4a31b75e085936c0aad5721190e343c9859d08b0dca5c0d312905e923b9faefb032bfab7ce419d716513373d45747", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="a63d511189854558fbef73310d618d1441b1b6be7029625776dcc09b7ca7bf5776c4522df2a015c5b2a90e2fe25b544aa392ff8f9db0c2f0f62097", @generic="370018fbf4034e441022582f01499a373f09"]}]}, 0x1274}, {&(0x7f0000001a00)={0x818, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc5, 0x0, 0x0, 0x1, [@generic="379e4dfea3c9fb8da2fdf10c2b16f34b59e29995cda234311efac589bccb65360162085c2c51b156485d4ea2aa81a69850ef8a28f64d3bb7aa4d1efd57728d871fe4ddae9dc1703fa853cc053b62516d2f344a55169c175bf113771ec95f28b16f0c55ceb2919930c95315df4da5b99b09fda8f9067fffa9c0afed80760dd543e0ee0acb9d4b527953de82fddd783036dbe6459660e865aa988b17db522bd2d151a0bdeb175b541fae279028aa74e91ebaf6861cf81d6e3d9b3c6954b2bfa8c6c7"]}, @generic="8c5114a8a6bf4d0c8d6d207d2a767ba08185a534f7b97ceab3ec1da0facb1a3bf486d8df07879f807f8d35567571293c56c2eedc02f60026e1c5782b169fb74a91610ef4eb962c652cbca35f74fb5f2d4a0c91f640ff8cd1acec8af8fa450f7de66849fff55a616713efb3f28d3f829cef77d88cb684af76477ccba51f99b0284effe61c065fe35fe002ff76ccd61b055d0defc907eac08040d5389f3ebbd2e2b4013679991d09463639bf1cf4a4d9491bd1428efab22ca3ea9062b2bbb6120c8dbaa8067796fb08840980ab22dfbe840136a416ecad6cce34b7d1a42b4572dbc19001fe0b25c28183606968fb752b35ff5a04fd01bbded107156ea9f4cbb04b9499076bc1d1e55658fe9e51ffd36e5707449a6ae44cfd9e1e17f366d52565efd18ee73349396b32a824167ff770a8dad7712d97377e4cf1ae722d4b1c281b386b381e4326a58800b57e763a1b0cbf4fb7737445f5039121697b00b481cc2a6077e543d0ff25808c33672be204e1bd032dcd0b966f6e0a251e1791029fd385dbc008809512e02e579d2376edeb6654281c869fe46cc99682addfa6c872597918f6693806bc5343a31ad5a2dad46fd9cca83ebd01dfd01e6b4f936611ce4aec3798be7cc43493031c2e1286afee73615f2a8a121b93ffb6dfe532a6421c628712510771066859dda1198acd6ebb87368652e05a6126bc95ced65213fa012b3e7f4bdfa8a9b69cc4dc7a011beda99d8b6038150f154104b2d360249ce9a378274cda0422139b1b28e4e3b478dbcb7fbdf107ace012051a8a0bf0933c72d4171fcf6bff1ba28156384378cb6a4bba59c357a2bfeaddebec6c741c2ce6b8e5f8484ca1cb1c1b0542101f8e8af82b2afd6dabe61d1a3b8a7c0f3479510825ad1e1db28905ad131e0fef8ab2546d0773c90fdb9eaee4838b12070f1d154f8c8ca2b1e68a2a7a8a7b992fc33e513e1ac4d186c424876079064825f090a4ce9d1fe3edc035f23db35c4037325b0385f35050e7dcae704a3349e30a4a98fab7a6499e9bb05f11a6187b775f97e1e4a973193767e41f41d079f129da1d7651290c298d6aeb878959f37e2f03cc07966f079edb755a518d6da35ce340af6ddcb4d7a4bba9181be01c87ab3c0d37dde1d0bec862fd29837e1b0ec008e95c9bb458a3203e5a7f8208aaec38c89c0d6c59fb37e7004d1e2a6ffd1d5e5f274058e6745e176aa458f0aa2babafd043c573bb7ee58c54504f913b36016802e02e3681f0cd5090ed3e3acd506374f5aeb8588fd0ff9655f8f423b79de5916a019dfce09f892f8e017b14bcf10b281312bd8e93506a994cf16859ff6f6f8e0cba993e3f05c0e7ee32fea96858609e86d45958bb87d27edde61a8e4188ac2167655649ec0525c7d62ca7e52f065c13773ba86e0ee7a30c9ec7b736fef613e211f90c7688ad1bcc92505e4e57478ccc34ccf4f3192bfe7c03591229458b38c49d9b525f6ea73d528b130d18cd51a2375fff6ec2f38ca24a051bd4a32dfbaf86621cf2698423ec2150754e30f48583689eaa03e66823142b57c4ad5fdc69d1a8cd96735f7f53fd63267f98fed319b4b9233ca24174d31efca2cbdd6d00bf6db061a4a4ea0fa4225eb4a12a54b34ed21c90e7c4e3ae5dbb4c0e81f4ea1bdf567dfe019f4b9401a516b52563f43f591e3bc9ae7968662c59e3f2e6a43bfe99ddf895882fea744c3562e1989334751a75b19e2b4923376a30bd549a181bc3a3e2dcaeba4eaa60e035f19b8f6f203c54a6bc11f118aab7f379efd6b2ca56cab2916f1b8658bebd9b7345be8451e2b08971ad12d5385db4a271ed535775e6afd04ed5f1245c99c1b74be169c48f0566f8e879fccff655e561f88d3968c17e62019a8641aa98687a9ad640e6b57ae54a467627e6f9fed713f73c248835948f016d77ac42bb205510744ca195424c36b9d0e701ab9a9e09ce86f2d9d880d0256b767598fad2a97ff64b78d9a6bbe6be8a886aaabd988185bace6d855bdd24a96fc10fda05ec82793c527df9a78d03fd9507171e1a0c6df847cce9a563d450d3f15cb77e630a065fddc443c4884bd64e66aa49ae3b5bfbea685ad88ab33029ce6a76827891cd62cb1304bbc0aa92d5e66b2717d88b6613de7a5f778aea90b326be21e611bdaeeef94a412308f152c68748d5dba581d815ec0e2834bf3726dd515220177e67ab1478637489601f5100dd3e0f6fd5aa4a7d1721943528c88353d08e131a50df5218e35b0b29cebae14df084bf1411c1ea18a74f1da774089eec79dc5e298821f26f86852ec4cf74e783ecd78e3aab7937af3a800ef050fba86c91c2f194859cfef90cb10cd97eece5989e770dadd49868959d0c98967ef57a5f14ba3a0eccc6b00206a9a6efbefaaa0e182ff329ad8409d3ea9c507dd4be55ede06666b0e5b48d6ced4c452f0f25fcd223eca616dabb054c7b33fcc0e68f66b8d70dd45baa52df450a8f8ab88d2bde84dc1d3c92125f56b01028cf51c9429f7df0c6c1a516d92ab2a8e020762db04e84f280dc5cb0c036175425a32516ee958dc52125cd702db0c28a38448b1557ca5a536bc7d1b6aab1cf4be29332ddfa376dc48021eb1d90f8f5ddf85686d1"]}, 0x818}], 0x3}, 0x0)
04:59:13 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x29, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
04:59:13 executing program 5:
r0 = socket$nl_audit(0x10, 0x3, 0x9)
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, 0x0, 0x0)
04:59:13 executing program 2:
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30)
04:59:13 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 72)
04:59:13 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x31, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0)
04:59:13 executing program 4:
socket$inet6(0xa, 0x2, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
mkdir(&(0x7f00000001c0)='./bus\x00', 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0)
socket$packet(0x11, 0x3, 0x300)
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140))
socket$nl_netfilter(0x10, 0x3, 0xc)
socket$nl_netfilter(0x10, 0x3, 0xc)
socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff})
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14)
sendto$inet6(r0, &(0x7f0000000280)="080309fcc1f74802010e0200c52cf7c21175e005b02f0800eb2b2ff0dac8897c6b112002faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f)
04:59:13 executing program 2:
openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x7ffffffff000)
04:59:13 executing program 5:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000180)=[@register_looper={0x630c}], 0x0, 0x0, 0x0})
[ 362.376933][T15992] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15992 comm=syz-executor.3
[ 362.389831][T15992] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15992 comm=syz-executor.3
[ 362.402779][T15992] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15992 comm=syz-executor.3
04:59:13 executing program 5:
r0 = socket(0x11, 0x2, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0)
04:59:13 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000000)={0xa, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000100)=0x6)
r0 = getpid()
sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x2b)
sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
setresuid(0x0, 0x0, 0x0)
sendmmsg$unix(r2, &(0x7f0000000380)=[{{&(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000a00), 0x0, &(0x7f0000000940)=ANY=[@ANYRES8=r2, @ANYRES32, @ANYRES16=r0, @ANYRES32, @ANYRES32, @ANYBLOB="00bfd61825210f91fdc12703772cdbb9e35f6f1288943cb564d56d3d051a8640d86e7287216f7f13089ff703b57a720df23eedd195bc9f43248a480a12c38486d7375c417d008092871326f9e39a04c14e43ab1524686eed805f1498fe2cde71fafe8a3ae5461f65aa45c2fc30da3a28d0e49d30d79978605078417425a828ddb5ba1714cdd09cb90de7a2c502902c845ed5251aa9459cd9ae419148c9dc", @ANYRESHEX=r0, @ANYRES32, @ANYRES32, @ANYBLOB="00000196f5cfc900000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRESHEX=r2, @ANYRES32=r1, @ANYRES32=r2, @ANYRES8=r1, @ANYBLOB="1c000053c9e925dd6600"/24, @ANYRES8=r2, @ANYRES16, @ANYRESHEX=r0, @ANYBLOB="b7499f6c755d670c48344ac803f2a8f297152af84eefa010269c111efd09ce008c7193e2b957dfe7593e8a86b6a7b46153ede0f19762c0e6641da1f295be589db5036d7f1f263a5f5e58d4b6230d1cb825ea397d33f95e676ecadfd33bb264ee0907b8e0af2a7f88200c0adae0f33ae25e8dfe3d6401424fac8732a6978ba99b98bfb8c9f965493a47a21c1151d6ed5032dc82c6489724a2ae9a69c33b0261f35a54aa58c9c7b7d0ab729991dda14372d6efae372a64b7937b756340802fafefa7bcbba55924a2d306f61ca3e649adbb06afd2198f93c233604261c798e5dc6130719a30ba85f47ebe6cffca3430f575483de552", @ANYRESOCT=r0, @ANYRESOCT, @ANYRES32, @ANYRES64], 0xa8, 0xc0c4}}], 0x1, 0x4000800)
syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1)
writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000040)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1)
04:59:13 executing program 0:
openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x41}, 0x18)
openat2$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x8}, 0x18)
[ 362.452661][T15987] loop1: detected capacity change from 0 to 2048
04:59:13 executing program 3:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@pointer, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f00000001c0)='GPL\x00'}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
04:59:13 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c)
04:59:13 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {}, {0x3, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0)
04:59:13 executing program 3:
r0 = socket$nl_audit(0x10, 0x3, 0x9)
sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="f8"], 0xf8}, 0x1, 0x0, 0x0, 0x2000c000}, 0x20004000)
[ 362.616889][T16017] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16017 comm=syz-executor.3
[ 362.638400][T16018] netlink: 'syz-executor.4': attribute type 4 has an invalid length.
[ 362.650229][T16018] netlink: 'syz-executor.4': attribute type 4 has an invalid length.
04:59:13 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 73)
04:59:13 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x541b, 0x0)
04:59:13 executing program 3:
open(0x0, 0x0, 0x0)
writev(0xffffffffffffffff, 0x0, 0x0)
r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r0, 0x208200)
r1 = socket$inet6(0xa, 0x1, 0x0)
close(r1)
r2 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r1, r2, 0x0, 0xffffdffa)
04:59:13 executing program 2:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @private0}})
04:59:13 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000580)={'ip6tnl0\x00', &(0x7f0000000900)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}})
04:59:13 executing program 2:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8907, 0x0)
[ 363.128292][T15987] syz-executor.1: attempt to access beyond end of device
[ 363.128292][T15987] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 363.193125][T16026] loop1: detected capacity change from 0 to 2048
04:59:14 executing program 4:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x8, 0x2, &(0x7f0000000200)=[@increfs], 0x0, 0x0, 0x0})
04:59:14 executing program 0:
syz_io_uring_setup(0x7a79, &(0x7f0000000040)={0x0, 0x0, 0x100}, &(0x7f00000000c0), &(0x7f0000000100))
04:59:14 executing program 2:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5})
ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1)
ioctl$TUNSETPERSIST(r0, 0x400454cd, 0x0)
04:59:14 executing program 5:
r0 = socket(0x11, 0x2, 0x0)
sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0)
04:59:14 executing program 0:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x7ffff000}}, 0x0)
04:59:14 executing program 4:
bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0x0, 0x3, 0x3, 0x0, 0x1}, 0x48)
[ 363.399673][T16033] tun0: tun_chr_ioctl cmd 1074025677
[ 363.416740][T16033] tun0: linktype set to 0
04:59:14 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0)
04:59:14 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8911, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:14 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0)
04:59:14 executing program 0:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000200)=[@increfs={0x40086310}], 0x0, 0x0, 0x0})
04:59:14 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x17, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}]}, 0x18}}, 0x0)
04:59:14 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 74)
04:59:14 executing program 3:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0x40086602, &(0x7f00000003c0)={0x60, 0x0, &(0x7f0000000180)=[@release, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, @free_buffer, @decrefs], 0x0, 0x0, 0x0})
04:59:14 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8982, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:14 executing program 2:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5420, 0x0)
r1 = dup(r0)
ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1)
[ 363.592514][T16026] syz-executor.1: attempt to access beyond end of device
[ 363.592514][T16026] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:14 executing program 5:
socket$inet6(0xa, 0x2, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
mkdir(&(0x7f00000001c0)='./bus\x00', 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0)
socket$packet(0x11, 0x3, 0x300)
socket$nl_netfilter(0x10, 0x3, 0xc)
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff})
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14)
sendto$inet6(r0, &(0x7f0000000280)="0803092cc1f74802010e0200c52cf7c21175e005b02f0800eb2b2ff0dac8897c6b112002faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f)
04:59:14 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x3, 0x5}, 0x14}}, 0x0)
04:59:14 executing program 4:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000900)={0x44, 0x0, &(0x7f0000000780)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x10, 0x0, &(0x7f0000000400)=[@request_death], 0x0, 0x0, 0x0})
04:59:14 executing program 0:
r0 = socket(0x840000000002, 0x0, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(r1, 0x800)
lseek(r1, 0x10200, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800)
r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r3, &(0x7f0000000440)=[{0x0}], 0x1)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
r5 = socket$inet6(0xa, 0x1, 0x0)
close(r5)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r5, r6, 0x0, 0xffffdffa)
syz_open_dev$vcsu(0x0, 0x4, 0x0)
sendfile(r1, r2, 0x0, 0x8400fffffffa)
04:59:14 executing program 2:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:14 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8948, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:14 executing program 2:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0})
04:59:14 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c)
[ 363.720311][T16060] loop1: detected capacity change from 0 to 2048
04:59:14 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 75)
04:59:14 executing program 5:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000500)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@empty}, {@in=@multicast1}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xf0}}, 0x0)
04:59:14 executing program 3:
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
lseek(0xffffffffffffffff, 0x10200, 0x0)
r1 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r3, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
r5 = socket$inet6(0xa, 0x1, 0x0)
close(r5)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r5, r6, 0x0, 0xffffdffa)
sendfile(r0, r1, 0x0, 0x8400fffffffa)
04:59:14 executing program 2:
fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
syz_io_uring_setup(0x2106, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000000080), &(0x7f00000000c0))
04:59:14 executing program 5:
mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x164e, 0x1)
[ 364.073287][T16060] syz-executor.1: attempt to access beyond end of device
[ 364.073287][T16060] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:14 executing program 2:
syz_io_uring_setup(0x2106, &(0x7f0000000000)={0x0, 0x0, 0x2}, 0x0, 0x0)
04:59:14 executing program 5:
r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x41}, 0x18)
ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0)
[ 364.151732][T16088] loop1: detected capacity change from 0 to 2048
[ 364.198981][T16088] FAULT_INJECTION: forcing a failure.
[ 364.198981][T16088] name failslab, interval 1, probability 0, space 0, times 0
[ 364.211872][T16088] CPU: 1 PID: 16088 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 364.222211][T16088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 364.232351][T16088] Call Trace:
[ 364.235744][T16088]
[ 364.238775][T16088] dump_stack_lvl+0xda/0x130
[ 364.243501][T16088] dump_stack+0x15/0x20
[ 364.247739][T16088] should_fail_ex+0x21f/0x230
[ 364.252586][T16088] ? iter_file_splice_write+0xeb/0x7e0
[ 364.258130][T16088] __should_failslab+0x92/0xa0
[ 364.263082][T16088] should_failslab+0x9/0x20
[ 364.267644][T16088] __kmem_cache_alloc_node+0x4e/0x210
[ 364.273110][T16088] ? splice_from_pipe+0xe0/0xe0
[ 364.278031][T16088] ? iter_file_splice_write+0xeb/0x7e0
[ 364.283692][T16088] __kmalloc+0x95/0x1a0
[ 364.287965][T16088] iter_file_splice_write+0xeb/0x7e0
[ 364.293593][T16088] ? splice_from_pipe+0xe0/0xe0
[ 364.298520][T16088] direct_splice_actor+0x8a/0xb0
[ 364.303517][T16088] splice_direct_to_actor+0x31d/0x690
[ 364.308998][T16088] ? direct_file_splice_eof+0x70/0x70
[ 364.314459][T16088] do_splice_direct+0x10d/0x190
[ 364.319337][T16088] ? do_splice_direct+0x190/0x190
[ 364.324541][T16088] do_sendfile+0x3c4/0x980
[ 364.329152][T16088] __x64_sys_sendfile64+0x110/0x150
[ 364.334376][T16088] do_syscall_64+0x44/0x110
[ 364.338904][T16088] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 364.344830][T16088] RIP: 0033:0x7f8517f84ae9
[ 364.349430][T16088] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 364.369328][T16088] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 364.378234][T16088] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 364.387106][T16088] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 364.395384][T16088] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 364.403767][T16088] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 364.411786][T16088] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 364.419959][T16088]
04:59:15 executing program 2:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0)
sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7)
r0 = getpid()
sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f0000000240))
ptrace$peeksig(0x4209, r0, &(0x7f0000000280)={0x0, 0x0, 0x1}, &(0x7f0000000780)=[{}])
syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
r3 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, @private0, @mcast2={0xff, 0x3}, 0x0, 0x0, 0xfffffffe}})
ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0})
fcntl$notify(r2, 0x402, 0x0)
04:59:15 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0)
sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7)
r0 = getpid()
sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000240))
syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0)
write$cgroup_devices(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x9)
r3 = socket(0x10, 0x2, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2={0xff, 0x3}, 0x0, 0x0, 0x0, 0xffffffff}})
ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0})
fcntl$notify(r2, 0x402, 0x6)
04:59:15 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 76)
04:59:15 executing program 0:
r0 = socket(0x840000000002, 0x0, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(r1, 0x800)
lseek(r1, 0x10200, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800)
r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r3, &(0x7f0000000440)=[{0x0}], 0x1)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
r5 = socket$inet6(0xa, 0x1, 0x0)
close(r5)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r5, r6, 0x0, 0xffffdffa)
syz_open_dev$vcsu(0x0, 0x4, 0x0)
sendfile(r1, r2, 0x0, 0x8400fffffffa)
04:59:15 executing program 4:
r0 = socket(0x840000000002, 0x0, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(r1, 0x800)
lseek(r1, 0x10200, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800)
r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r3, &(0x7f0000000440)=[{0x0}], 0x1)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
r5 = socket$inet6(0xa, 0x1, 0x0)
close(r5)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r5, r6, 0x0, 0xffffdffa)
syz_open_dev$vcsu(0x0, 0x4, 0x0)
sendfile(r1, r2, 0x0, 0x8400fffffffa)
[ 364.608421][T16101] loop1: detected capacity change from 0 to 2048
04:59:15 executing program 4:
r0 = socket(0x840000000002, 0x0, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(r1, 0x800)
lseek(r1, 0x10200, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800)
r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r3, &(0x7f0000000440)=[{0x0}], 0x1)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
r5 = socket$inet6(0xa, 0x1, 0x0)
close(r5)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r5, r6, 0x0, 0xffffdffa)
syz_open_dev$vcsu(0x0, 0x4, 0x0)
sendfile(r1, r2, 0x0, 0x8400fffffffa)
04:59:15 executing program 3:
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
lseek(0xffffffffffffffff, 0x10200, 0x0)
r1 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r3, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
r5 = socket$inet6(0xa, 0x1, 0x0)
close(r5)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r5, r6, 0x0, 0xffffdffa)
sendfile(r0, r1, 0x0, 0x8400fffffffa)
04:59:16 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 77)
[ 365.346142][T16101] syz-executor.1: attempt to access beyond end of device
[ 365.346142][T16101] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:16 executing program 2:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8983, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:16 executing program 5:
openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x41}, 0xff4)
[ 365.399327][T16136] loop1: detected capacity change from 0 to 2048
04:59:16 executing program 0:
r0 = socket(0x840000000002, 0x0, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(r1, 0x800)
lseek(r1, 0x10200, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800)
r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r3, &(0x7f0000000440)=[{0x0}], 0x1)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
r5 = socket$inet6(0xa, 0x1, 0x0)
close(r5)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r5, r6, 0x0, 0xffffdffa)
syz_open_dev$vcsu(0x0, 0x4, 0x0)
sendfile(r1, r2, 0x0, 0x8400fffffffa)
04:59:16 executing program 2:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={0x0}}, 0x0)
04:59:16 executing program 2:
r0 = socket$tipc(0x1e, 0x2, 0x0)
getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000280), &(0x7f00000002c0)=0x4)
04:59:16 executing program 5:
r0 = socket(0x10, 0x3, 0x6)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0)
04:59:16 executing program 5:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00'}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10)
pipe2(&(0x7f0000000400), 0x0)
04:59:16 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48)
04:59:16 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x7ffffffff000}, 0x1, 0x0, 0xffffffff00000000}, 0x0)
[ 365.551516][ T27] audit: type=1400 audit(1699678756.325:386): avc: denied { read } for pid=16147 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 365.842324][T16136] syz-executor.1: attempt to access beyond end of device
[ 365.842324][T16136] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:16 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2, 0x17, 0x0, 0x0, 0x2}, 0x37fe0}}, 0x0)
04:59:16 executing program 5:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x8, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="bb"], 0x0, 0x0, 0x0})
04:59:16 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 78)
04:59:16 executing program 3:
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
lseek(0xffffffffffffffff, 0x10200, 0x0)
r1 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r3, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
r5 = socket$inet6(0xa, 0x1, 0x0)
close(r5)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r5, r6, 0x0, 0xffffdffa)
sendfile(r0, r1, 0x0, 0x8400fffffffa)
04:59:16 executing program 4:
r0 = socket(0x840000000002, 0x0, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(r1, 0x800)
lseek(r1, 0x10200, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800)
r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r3, &(0x7f0000000440)=[{0x0}], 0x1)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
r5 = socket$inet6(0xa, 0x1, 0x0)
close(r5)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r5, r6, 0x0, 0xffffdffa)
syz_open_dev$vcsu(0x0, 0x4, 0x0)
sendfile(r1, r2, 0x0, 0x8400fffffffa)
[ 366.048781][T16168] loop1: detected capacity change from 0 to 2048
[ 366.082445][T16168] FAULT_INJECTION: forcing a failure.
[ 366.082445][T16168] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 366.095851][T16168] CPU: 0 PID: 16168 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 366.106137][T16168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 366.116408][T16168] Call Trace:
[ 366.119782][T16168]
[ 366.122852][T16168] dump_stack_lvl+0xda/0x130
[ 366.127814][T16168] dump_stack+0x15/0x20
[ 366.132214][T16168] should_fail_ex+0x21f/0x230
[ 366.137218][T16168] __should_fail_alloc_page+0xfd/0x110
[ 366.142744][T16168] __alloc_pages+0x108/0x340
[ 366.147498][T16168] alloc_pages_mpol+0xb1/0x1d0
[ 366.152396][T16168] folio_alloc+0xea/0x120
[ 366.156826][T16168] filemap_alloc_folio+0x68/0x220
[ 366.161924][T16168] __filemap_get_folio+0x298/0x5a0
[ 366.167102][T16168] ? invalidate_inode_pages2_range+0x6cc/0x720
[ 366.173477][T16168] pagecache_get_page+0x2a/0x90
[ 366.178488][T16168] ? fat_block_truncate_page+0x40/0x40
[ 366.184181][T16168] grab_cache_page_write_begin+0x2e/0x40
[ 366.189863][T16168] block_write_begin+0x31/0x170
[ 366.194824][T16168] cont_write_begin+0x479/0x690
[ 366.199708][T16168] fat_write_begin+0x61/0xf0
[ 366.204382][T16168] ? fat_block_truncate_page+0x40/0x40
[ 366.210048][T16168] generic_perform_write+0x1c9/0x410
[ 366.215406][T16168] ? generic_file_direct_write+0x1dc/0x1f0
[ 366.221339][T16168] __generic_file_write_iter+0xec/0x120
[ 366.226984][T16168] generic_file_write_iter+0x7d/0x1c0
[ 366.232730][T16168] do_iter_write+0x4ad/0x770
[ 366.237390][T16168] ? iter_file_splice_write+0xeb/0x7e0
[ 366.242991][T16168] vfs_iter_write+0x56/0x70
[ 366.247536][T16168] iter_file_splice_write+0x462/0x7e0
[ 366.253117][T16168] ? splice_from_pipe+0xe0/0xe0
[ 366.258048][T16168] direct_splice_actor+0x8a/0xb0
[ 366.263262][T16168] splice_direct_to_actor+0x31d/0x690
[ 366.268679][T16168] ? direct_file_splice_eof+0x70/0x70
[ 366.274083][T16168] do_splice_direct+0x10d/0x190
[ 366.279093][T16168] ? do_splice_direct+0x190/0x190
[ 366.284503][T16168] do_sendfile+0x3c4/0x980
[ 366.289146][T16168] __x64_sys_sendfile64+0x110/0x150
[ 366.294475][T16168] do_syscall_64+0x44/0x110
[ 366.299046][T16168] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 366.305171][T16168] RIP: 0033:0x7f8517f84ae9
[ 366.309807][T16168] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 366.329995][T16168] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 366.338548][T16168] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
04:59:17 executing program 0:
r0 = socket(0x840000000002, 0x0, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(r1, 0x800)
lseek(r1, 0x10200, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800)
r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r3, &(0x7f0000000440)=[{0x0}], 0x1)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
r5 = socket$inet6(0xa, 0x1, 0x0)
close(r5)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r5, r6, 0x0, 0xffffdffa)
syz_open_dev$vcsu(0x0, 0x4, 0x0)
sendfile(r1, r2, 0x0, 0x8400fffffffa)
04:59:17 executing program 5:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0x401c5820, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000200)=[@increfs], 0x0, 0x0, 0x0})
04:59:17 executing program 2:
openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)={0x200, 0x0, 0x34}, 0x18)
04:59:17 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 79)
[ 366.346596][T16168] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 366.354644][T16168] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 366.362938][T16168] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 366.371287][T16168] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 366.379307][T16168]
04:59:17 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4108}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0)
04:59:17 executing program 2:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@pointer, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f00000001c0)='GPL\x00'}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10)
openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0)
04:59:17 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x401, 0x2, 0x1}, 0x48)
[ 366.480422][T16175] loop1: detected capacity change from 0 to 2048
[ 366.850149][T16175] syz-executor.1: attempt to access beyond end of device
[ 366.850149][T16175] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:17 executing program 2:
r0 = socket$nl_audit(0x10, 0x3, 0x9)
sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[], 0xf8}}, 0x0)
04:59:17 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x40086602, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:17 executing program 3:
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
lseek(0xffffffffffffffff, 0x10200, 0x0)
r1 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r3, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1)
r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r4, 0x208200)
r5 = socket$inet6(0xa, 0x1, 0x0)
close(r5)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r5, r6, 0x0, 0xffffdffa)
sendfile(r0, r1, 0x0, 0x8400fffffffa)
04:59:17 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 80)
04:59:17 executing program 4:
r0 = socket(0x11, 0x2, 0x0)
sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
[ 366.934969][T16192] loop1: detected capacity change from 0 to 2048
04:59:18 executing program 4:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89a3, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:18 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4107}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0)
04:59:18 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @local}})
[ 367.283190][T16192] syz-executor.1: attempt to access beyond end of device
[ 367.283190][T16192] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:18 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 81)
04:59:18 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[], 0x70}, 0x300}, 0x0)
04:59:18 executing program 2:
r0 = socket(0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
lseek(0xffffffffffffffff, 0x10200, 0x0)
sendmsg$nl_route_sched(r0, 0x0, 0x800)
open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0)
writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1)
r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r2, 0x208200)
r3 = socket$inet6(0xa, 0x1, 0x0)
close(r3)
r4 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r3, r4, 0x0, 0xffffdffa)
04:59:18 executing program 4:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x30, 0x3, 0x3, 0x301, 0x0, 0x0, {}, [@NFQA_MARK={0x8}, @NFQA_VERDICT_HDR={0xc}, @NFQA_MARK={0x8}]}, 0x30}}, 0x0)
04:59:18 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x9, 0x0, &(0x7f00000000c0)='syzkaller\x00'}, 0x90)
04:59:18 executing program 0:
r0 = socket$tipc(0x1e, 0x5, 0x0)
setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000140)=0xffffffff, 0x4)
04:59:18 executing program 4:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8927, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:18 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000340), 0x4)
04:59:18 executing program 3:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b1424"], 0x0, 0x0, 0x0})
[ 367.430933][T16204] loop1: detected capacity change from 0 to 2048
[ 367.464180][T16220] tipc: Trying to set illegal importance in message
04:59:18 executing program 4:
socket$inet6(0xa, 0x2, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
mkdir(&(0x7f00000001c0)='./bus\x00', 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0)
socket$packet(0x11, 0x3, 0x300)
socket$nl_netfilter(0x10, 0x3, 0xc)
r0 = socket$packet(0x11, 0x2, 0x300)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff})
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14)
sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0)
04:59:18 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0)
sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7)
r0 = getpid()
sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4)
connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0)
getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f0000000240))
ptrace$peeksig(0x4209, r0, &(0x7f0000000280), &(0x7f0000000780))
syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2={0xff, 0x3}, 0x0, 0x0, 0xfffffffe, 0xffffffff}})
ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0})
fcntl$notify(0xffffffffffffffff, 0x402, 0x6)
04:59:18 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0xa}, 0x0)
04:59:18 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 82)
04:59:18 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891f, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:18 executing program 4:
socket$inet6(0xa, 0x2, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
mkdir(&(0x7f00000001c0)='./bus\x00', 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0)
socket$packet(0x11, 0x3, 0x300)
socket$nl_netfilter(0x10, 0x3, 0xc)
r0 = socket$packet(0x11, 0x2, 0x300)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff})
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14)
sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0)
04:59:18 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x401c5820, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:18 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5452, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:18 executing program 2:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000200)=[@increfs={0x40406301}], 0x0, 0x0, 0x0})
04:59:18 executing program 4:
socket$inet6(0xa, 0x2, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
mkdir(&(0x7f00000001c0)='./bus\x00', 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0)
socket$packet(0x11, 0x3, 0x300)
socket$nl_netfilter(0x10, 0x3, 0xc)
r0 = socket$packet(0x11, 0x2, 0x300)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff})
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14)
sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0)
04:59:18 executing program 5:
socket$key(0xf, 0x3, 0x2)
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2, 0x17, 0x0, 0x0, 0x2}, 0x10}}, 0x0)
04:59:18 executing program 3:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, 0x0)
[ 367.824926][T16204] syz-executor.1: attempt to access beyond end of device
[ 367.824926][T16204] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:18 executing program 0:
openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0xfffffe98)
04:59:18 executing program 2:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x508, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x31}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568)
04:59:18 executing program 0:
r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x41}, 0x18)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v2={0x2, @adiantum, 0x0, '\x00', @d})
[ 367.947251][T16252] loop1: detected capacity change from 0 to 2048
04:59:19 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5}, 0x90)
04:59:19 executing program 3:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, 0x0)
04:59:19 executing program 2:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891e, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:19 executing program 4:
socket$inet6(0xa, 0x2, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
mkdir(&(0x7f00000001c0)='./bus\x00', 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0)
socket$packet(0x11, 0x3, 0x300)
socket$nl_netfilter(0x10, 0x3, 0xc)
r0 = socket$packet(0x11, 0x2, 0x300)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff})
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14)
sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0)
04:59:19 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 83)
04:59:19 executing program 0:
r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x41}, 0x18)
ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000000)={@desc={0x1, 0x0, @desc2}})
04:59:19 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8970, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
[ 368.203751][T16252] syz-executor.1: attempt to access beyond end of device
[ 368.203751][T16252] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:19 executing program 3:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, 0x0)
04:59:19 executing program 2:
r0 = socket(0x2, 0x3, 0x7)
sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000ac0)={&(0x7f0000000900), 0xc, &(0x7f0000000a00)={0x0}}, 0x0)
04:59:19 executing program 4:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='T'], 0x54}, 0x1, 0x0, 0x0, 0x4000080}, 0x200000c4)
04:59:19 executing program 5:
r0 = socket$tipc(0x1e, 0x2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'})
04:59:19 executing program 2:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8983, 0x0)
04:59:19 executing program 3:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, 0x0)
04:59:19 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f00000001c0)=0x4, 0x4)
04:59:19 executing program 2:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x5c, 0x0, &(0x7f0000000200)=[@request_death, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0})
04:59:19 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000580)={'ip6tnl0\x00', &(0x7f0000000900)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}})
[ 368.302005][T16269] loop1: detected capacity change from 0 to 2048
[ 368.313521][T16281] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=16281 comm=syz-executor.4
04:59:19 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 84)
04:59:19 executing program 4:
getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14)
04:59:19 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x2}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0)
04:59:19 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x68}}, 0x0)
04:59:19 executing program 5:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x15, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2}, @sadb_key={0x1, 0x8}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x50}}, 0x0)
04:59:19 executing program 2:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0)
sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7)
r0 = getpid()
sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f0000000240))
ptrace$peeksig(0x4209, r0, &(0x7f0000000280)={0x0, 0x0, 0x1}, &(0x7f0000000780)=[{}])
syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
r3 = socket(0x10, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2={0xff, 0x3}, 0x0, 0x0, 0xfffffffe, 0xffffffff}})
ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0})
fcntl$notify(r2, 0x402, 0x6)
04:59:19 executing program 4:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f1, &(0x7f0000000580)={'ip6tnl0\x00', 0x0})
04:59:19 executing program 3:
mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1c00, 0x1)
[ 368.636826][T16269] syz-executor.1: attempt to access beyond end of device
[ 368.636826][T16269] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:19 executing program 5:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, &(0x7f0000000080))
04:59:19 executing program 0:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000200)=[@increfs], 0x0, 0x0, 0x0})
04:59:19 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0xffffffff00000000}, 0x0)
04:59:19 executing program 5:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, &(0x7f0000000080))
[ 368.717014][T16304] loop1: detected capacity change from 0 to 2048
04:59:19 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 85)
04:59:19 executing program 0:
r0 = socket(0x840000000002, 0x3, 0x100)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(r1, 0x800)
lseek(r1, 0x10200, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="2eb40d010000080016bae018ff4b"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800)
r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1)
r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
r4 = socket$inet6(0xa, 0x1, 0x0)
close(r4)
r5 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r4, r5, 0x0, 0xffffdffa)
syz_open_dev$vcsu(&(0x7f0000000500), 0x4, 0x0)
sendfile(r1, r2, 0x0, 0x8400fffffffa)
04:59:19 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x6, 0x4)
04:59:19 executing program 4:
sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x84, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}]}, 0x84}}, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x70}, 0x8}, 0x0)
04:59:19 executing program 5:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, &(0x7f0000000080))
[ 369.083729][T16304] syz-executor.1: attempt to access beyond end of device
[ 369.083729][T16304] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 369.237958][T16329] loop1: detected capacity change from 0 to 2048
[ 369.265262][T16329] FAULT_INJECTION: forcing a failure.
[ 369.265262][T16329] name failslab, interval 1, probability 0, space 0, times 0
[ 369.278011][T16329] CPU: 0 PID: 16329 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 369.288124][T16329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 369.298210][T16329] Call Trace:
[ 369.301516][T16329]
[ 369.304459][T16329] dump_stack_lvl+0xda/0x130
[ 369.309168][T16329] dump_stack+0x15/0x20
[ 369.313678][T16329] should_fail_ex+0x21f/0x230
[ 369.318497][T16329] ? iter_file_splice_write+0xeb/0x7e0
[ 369.324200][T16329] __should_failslab+0x92/0xa0
[ 369.329292][T16329] should_failslab+0x9/0x20
[ 369.334337][T16329] __kmem_cache_alloc_node+0x4e/0x210
[ 369.340444][T16329] ? splice_from_pipe+0xe0/0xe0
[ 369.345535][T16329] ? iter_file_splice_write+0xeb/0x7e0
[ 369.351251][T16329] __kmalloc+0x95/0x1a0
[ 369.355562][T16329] iter_file_splice_write+0xeb/0x7e0
[ 369.360918][T16329] ? splice_from_pipe+0xe0/0xe0
[ 369.365818][T16329] direct_splice_actor+0x8a/0xb0
[ 369.370814][T16329] splice_direct_to_actor+0x31d/0x690
[ 369.376311][T16329] ? direct_file_splice_eof+0x70/0x70
[ 369.381802][T16329] do_splice_direct+0x10d/0x190
[ 369.386811][T16329] ? do_splice_direct+0x190/0x190
[ 369.392054][T16329] do_sendfile+0x3c4/0x980
[ 369.396524][T16329] __x64_sys_sendfile64+0x110/0x150
[ 369.401932][T16329] do_syscall_64+0x44/0x110
[ 369.406545][T16329] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 369.412664][T16329] RIP: 0033:0x7f8517f84ae9
[ 369.417103][T16329] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 369.437240][T16329] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 369.445870][T16329] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 369.453878][T16329] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 369.461911][T16329] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 369.470033][T16329] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 369.478168][T16329] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 369.486180][T16329]
04:59:20 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f0, &(0x7f0000000580)={'ip6tnl0\x00', 0x0})
04:59:20 executing program 4:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8930, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:20 executing program 5:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, &(0x7f0000000080))
04:59:20 executing program 2:
syz_io_uring_setup(0xd95, &(0x7f0000000000)={0x0, 0x0, 0x4}, 0x0, 0x0)
04:59:20 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 86)
04:59:20 executing program 5:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
read$msr(r0, 0x0, 0x0)
04:59:20 executing program 2:
symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00')
unlinkat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0)
04:59:20 executing program 4:
openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000240)={0x24a840}, 0x18)
[ 369.595633][T16335] loop1: detected capacity change from 0 to 2048
[ 369.631301][T16335] FAULT_INJECTION: forcing a failure.
[ 369.631301][T16335] name failslab, interval 1, probability 0, space 0, times 0
[ 369.644195][T16335] CPU: 0 PID: 16335 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 369.654500][T16335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 369.664622][T16335] Call Trace:
[ 369.668107][T16335]
[ 369.671063][T16335] dump_stack_lvl+0xda/0x130
[ 369.675693][T16335] dump_stack+0x15/0x20
[ 369.679962][T16335] should_fail_ex+0x21f/0x230
[ 369.684705][T16335] ? __blockdev_direct_IO+0x137/0x1f90
[ 369.690311][T16335] __should_failslab+0x92/0xa0
[ 369.695362][T16335] should_failslab+0x9/0x20
[ 369.700013][T16335] kmem_cache_alloc+0x4e/0x250
[ 369.704840][T16335] __blockdev_direct_IO+0x137/0x1f90
[ 369.710188][T16335] ? __rcu_read_unlock+0x4d/0x70
[ 369.715348][T16335] ? find_get_entries+0x397/0x410
[ 369.720443][T16335] ? fat_block_truncate_page+0x40/0x40
[ 369.726334][T16335] ? invalidate_inode_pages2_range+0x6cc/0x720
[ 369.732664][T16335] fat_direct_IO+0x110/0x1d0
[ 369.737496][T16335] generic_file_direct_write+0xab/0x1f0
[ 369.743213][T16335] ? mnt_put_write_access_file+0x95/0xb0
[ 369.748913][T16335] __generic_file_write_iter+0xae/0x120
[ 369.754530][T16335] generic_file_write_iter+0x7d/0x1c0
[ 369.760071][T16335] do_iter_write+0x4ad/0x770
[ 369.764767][T16335] ? iter_file_splice_write+0xeb/0x7e0
[ 369.770432][T16335] vfs_iter_write+0x56/0x70
[ 369.775076][T16335] iter_file_splice_write+0x462/0x7e0
[ 369.780574][T16335] ? splice_from_pipe+0xe0/0xe0
[ 369.785592][T16335] direct_splice_actor+0x8a/0xb0
[ 369.790732][T16335] splice_direct_to_actor+0x31d/0x690
[ 369.796178][T16335] ? direct_file_splice_eof+0x70/0x70
[ 369.801770][T16335] do_splice_direct+0x10d/0x190
[ 369.806908][T16335] ? do_splice_direct+0x190/0x190
[ 369.812063][T16335] do_sendfile+0x3c4/0x980
[ 369.816795][T16335] __x64_sys_sendfile64+0x110/0x150
[ 369.822038][T16335] do_syscall_64+0x44/0x110
[ 369.826614][T16335] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 369.832601][T16335] RIP: 0033:0x7f8517f84ae9
[ 369.837046][T16335] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 369.857040][T16335] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 369.865485][T16335] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 369.873481][T16335] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 369.881508][T16335] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 369.889782][T16335] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 369.897886][T16335] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 369.906017][T16335]
04:59:20 executing program 0:
r0 = socket(0x18, 0x0, 0x1)
sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x4a0}}, 0x0)
04:59:20 executing program 3:
syz_io_uring_setup(0x2106, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000000080), &(0x7f00000000c0))
04:59:20 executing program 5:
syz_io_uring_setup(0x79, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0))
04:59:20 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@pointer, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f00000001c0)='GPL\x00'}, 0x90)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)={'syz0', "c7a8f4fe6e4ab1c9319e53f252a5a5e49efcdcc85b97ca25b41790ce09b7d03d8661f48cb8027764cd3f094873c3eb5ad05c594491267c655c98e30fd6cbe87502da39cc79e78dee846f06dfa64448fb19fc850cb18d80fbb3538ebd82f3dd264353ee6cf62a5ba4fca57deafa7be4e4647fb068e4fdfff68694d6467e4a64475a09224795a2cfe2683a04f29229373949b26c5f7aeca387ad5657166bac50a9613f5427e5675db6e7e55bf0f7368d5f319995f36a72bba3f0abb0cbac5d2d3adf9e6dd8104226640c6ba7d6dc52bcf298c7f4c46edd4f4cda1c159fb41e34fcd538d4"}, 0xe7)
04:59:20 executing program 4:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0x5452, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
04:59:20 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 87)
04:59:20 executing program 4:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8923, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:20 executing program 3:
r0 = socket$vsock_stream(0x28, 0x1, 0x0)
setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, 0x0, 0x59)
04:59:20 executing program 5:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x2}}, 0x0)
04:59:20 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x400b}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0)
04:59:20 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$BATADV_CMD_GET_GATEWAYS(r0, 0xffffffffffffffff, 0x0)
04:59:20 executing program 5:
r0 = socket$nl_audit(0x10, 0x3, 0x9)
sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="f8"], 0xf8}}, 0x0)
04:59:20 executing program 4:
syz_io_uring_setup(0x204b, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0))
04:59:20 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0xa}, 0x0)
04:59:20 executing program 4:
r0 = socket$tipc(0x1e, 0x2, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0)
04:59:20 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x7ffff000}}, 0x0)
[ 370.050031][T16353] loop1: detected capacity change from 0 to 2048
04:59:20 executing program 0:
syz_io_uring_setup(0x629d, &(0x7f0000000200)={0x0, 0x0, 0x200}, 0x0, 0x0)
[ 370.133231][T16377] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16377 comm=syz-executor.5
04:59:21 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 88)
04:59:21 executing program 3:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0x4020940d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
04:59:21 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x17, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}]}, 0x18}}, 0x0)
04:59:21 executing program 2:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8902, 0x0)
04:59:21 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0)
sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7)
r0 = getpid()
sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
write$cgroup_devices(0xffffffffffffffff, 0x0, 0x9)
r3 = socket(0x10, 0x2, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @mcast2={0xff, 0x3}, 0x0, 0x0, 0xfffffffe, 0xffffffff}})
ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0})
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:59:21 executing program 0:
execveat(0xffffffffffffffff, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x0)
04:59:21 executing program 3:
bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0x0, 0x3, 0x3, 0x2881, 0x1}, 0x48)
04:59:21 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff)
sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)={0x14, r1, 0x1}, 0x14}}, 0x0)
04:59:21 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x37fe0}}, 0x0)
[ 370.415197][T16353] syz-executor.1: attempt to access beyond end of device
[ 370.415197][T16353] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:21 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
getsockopt$inet_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f00000000c0))
04:59:21 executing program 3:
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x4, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}], &(0x7f0000000300)='syzkaller\x00'}, 0x90)
04:59:21 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x70}, 0x1, 0x0, 0x2}, 0x0)
[ 370.814166][T16408] loop1: detected capacity change from 0 to 2048
04:59:21 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 89)
04:59:21 executing program 3:
select(0x40, &(0x7f00000002c0), 0x0, 0x0, &(0x7f00000005c0)={0x77359400})
04:59:21 executing program 4:
socket(0xa, 0x5, 0x3ff)
04:59:21 executing program 2:
r0 = socket(0x2, 0x3, 0x7)
sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x0)
[ 371.121859][T16408] syz-executor.1: attempt to access beyond end of device
[ 371.121859][T16408] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 371.189625][T16416] loop1: detected capacity change from 0 to 2048
04:59:22 executing program 0:
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000180)=[@register_looper, @release], 0x0, 0x0, 0x0})
04:59:22 executing program 2:
socket(0x840000000002, 0x0, 0x0)
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(r0, 0x800)
lseek(r0, 0x10200, 0x0)
open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0)
r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0)
ftruncate(r1, 0x208200)
r2 = socket$inet6(0xa, 0x1, 0x0)
close(r2)
r3 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0)
sendfile(r2, r3, 0x0, 0xffffdffa)
04:59:22 executing program 4:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8971, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:22 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @private0}})
04:59:22 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f2, &(0x7f0000000580)={'ip6tnl0\x00', 0x0})
04:59:22 executing program 4:
execveat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[0xffffffffffffffff], 0x0, 0x0)
04:59:22 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8943, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:22 executing program 5:
socket$inet6(0xa, 0x2, 0x0)
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff})
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14)
sendto$inet6(r0, &(0x7f0000000280)="08031400c1f74802010e0200c52cf7c22c75e005b02f0800eb2b2ff0dac8897c6b112002faffffff3066090cb600c5471d13", 0x32, 0x0, 0x0, 0x0)
04:59:22 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 90)
[ 371.549865][T16416] syz-executor.1: attempt to access beyond end of device
[ 371.549865][T16416] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 371.604090][T16436] loop1: detected capacity change from 0 to 2048
[ 371.857342][T16436] syz-executor.1: attempt to access beyond end of device
[ 371.857342][T16436] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:22 executing program 4:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x401, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48)
04:59:22 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 91)
04:59:22 executing program 5:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x2, 0x0, 0x0, 0x2}, 0x10}}, 0x0)
04:59:22 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[], 0x10}}, 0x0)
04:59:22 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0)
04:59:22 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8)
sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00')
r1 = getpid()
sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e)
sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000340), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000480)=""/63, 0x3f}, {&(0x7f00000004c0)=""/164, 0xa4}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0xc0}, 0x0)
sched_setaffinity(0x0, 0xfffffffffffffea1, &(0x7f0000000200)=0x1000000000d)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = getpid()
getpgid(r8)
sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0)
r9 = syz_open_procfs$namespace(0x0, 0x0)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003400)={0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000000940)=ANY=[@ANYBLOB="1080090000009d681f500000000000ffff000038626e92a669d5b2d5003ad69dc6cb1cc49747e5c8fc5aff86aab9e2c081aaed478cbd3c879386a1325d3ee75ce98186697964e524974659261fc099c589aeb708b511"], 0x10}], 0x1}, 0x0)
ptrace$pokeuser(0x6, 0x0, 0x81, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, 0x0)
sendmsg$netlink(r7, &(0x7f0000000840)={&(0x7f00000001c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x80}, 0xc, &(0x7f0000000240)=[{&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x34}], 0x1, &(0x7f0000000c40)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES64, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r6, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYBLOB="000000000100008001000000000000000000", @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="650000009aa5f1c3391676da551c0000000000f9ffffffffffffff0000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYBLOB="fcfc3f6336d2a69e2bb9950fcde71a1d1b6eaebc694c19b457873d162815268793007f1902fbbf8b19b77c8180ffb1445c7e53199d804a28189810f1adcfa1d569e662378f31338144b3faeb9316fd7a97713f43b430a7810df61c970c8f78b1330098f03ec8eee5e63775fba2775b6596d0fecc44162214451acb4eb360eface1a342eaf2d859ec20b90d9b82d92282d845f2ab9d9d1e13fa322dfa30b0ff5c633233ffb797ad3728f9284aa4158e8314ff1cac819357afbc2c310dbc20aa", @ANYRES32=0xee01, @ANYRES32=r2, @ANYBLOB="eeffffff9198f015000800000100000001006dd54b560000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r10, @ANYRESDEC=r4, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6], 0x118, 0xc080}, 0x0)
sched_setscheduler(0x0, 0x5, &(0x7f0000000600)=0x5)
r11 = gettid()
fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff0000000000008067da969e00", @ANYRES32=r11, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRESDEC=r1], 0x40}}, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0)
04:59:22 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8992, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:22 executing program 3:
setgroups(0x4, &(0x7f0000000000)=[0x0, 0x0, 0xee01, 0xee00])
04:59:22 executing program 4:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8902, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:22 executing program 2:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8946, &(0x7f0000000080)={'ip6gre0\x00', 0x0})
04:59:22 executing program 5:
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r1)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedd17907001175f37538e486dd6317ce2200003200db5b6861588d0a04884153e2aef57beeff"], 0xfdef)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
04:59:22 executing program 3:
perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000002880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48)
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0506617, &(0x7f0000000040)=0x2)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x58, &(0x7f00000005c0)}, 0x10)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000010c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0), &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000bc0), &(0x7f0000000dc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000840)}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000440)={0xa, 0x2}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000001100)=[{0x4, 0x1, 0x6, 0x8}, {0x1, 0x3, 0x10, 0x5}, {0x4, 0x5, 0x4, 0x8}], 0x10, 0x8}, 0x90)
bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0xff, 0x8, 0x0, 0x56, 0x0, 0x80000001, 0x40, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10001, 0x2, @perf_config_ext={0x6, 0x9}, 0x200, 0x8000000000000001, 0x56e, 0x9, 0x1, 0x100, 0x6ff, 0x0, 0x9, 0x0, 0x10000})
[ 372.032217][T16442] loop1: detected capacity change from 0 to 2048
04:59:22 executing program 5:
ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000040))
sched_rr_get_interval(0x0, &(0x7f0000000500))
04:59:22 executing program 2:
prctl$PR_SET_THP_DISABLE(0x37, 0x0)
[ 372.235389][T16463] wireguard0: entered promiscuous mode
[ 372.241135][T16463] wireguard0: entered allmulticast mode
04:59:23 executing program 2:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000000000000002898bbb7c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd78000000008000000000000000"], 0x1, 0x793, &(0x7f0000001700)="$eJzs3c1rXFUbAPDnTpKmb9r3TV4QbF0FBA2UTkyNrYKLigsRLBR0bTtMpqFmkimZSWlCoBYR3AhaXAi66dqPunPrx1b/Bd2ISEvVtFhxISN3PjqTZiadtvloze8Htz3n3jM595l77zln5h7mBrBjjab/ZCL2R8R7ScRwY30SEQO1VH/E0Xq5myvL+XRJolp99bekVubGynI+2l6T2tPI7IuIb96OOJBZW295cWkmVywW5hv58crsmfHy4tLB07O56cJ0Ye7wxOTkoSPPHBncuFj/+H5p79X3X3ry86N/vfXo5Xe/TeJo7G1sa49jo4zGaOM9GUjfwlVe3OjKtlmy3TvAPUkvzb76VR77Yzj6aqne9F4SAHiQnI+IKgCwwyT6fwDYYZrfA9xYWc6nS/X89n4fsdWuvRARu+vxN+9v1rf0N+7Z7a7dBx26kay635FExMgG1D8aER9/+fqn6RKbdB8SoJM3L0TEyZHRZvvfan+SNXMW6nqfkPFUD2VGb8tr/2DrfJWOf55tjf9a11/m1vgnOox/Bjtcu/diNGJXe37t9Z+5sgHVdJWO/54faM1tu9kWf8NIXyP339qYbyA5dbpYSNu2/0XEWAwMpvmJdeoYu/739VUr+lrJ9vHf7xff+CStP/2/VSJzpf+2JncqV8ndb9xN1y5EPNbfKf7k1vFPuox/j/dYx8vPvfNRt21p/Gm8zWV1/Js/q6x6KeKJ6Bx/U7Le/MTD47XTYbx5UnTwxU8fDnWrv/34p0taf/OzwFZIj//Q+vGPJO3zNct3X8d3l4a/7rbtzvF3Pv93Ja/V0s3G41yuUpmfiNiVvLJ2/aHWa5v5Zvk0/rHHO1//653/6WfCkz3G33/118/uPf7NlcY/dVfH/+4Tl2/O9HWrv7fjP1lLjTXW9NL+9bqD9/PeAQAAAAAAAAAAAAAAAAAAAAAAAECvMhGxN5JM9lY6k8lm68/wfiSGMsVSuXLgVGlhbipqz8oeiYFM86cuh9t+D3Wi8Xv4zfyh2/JPR8T/I+KDwf/U8tl8qTi13cEDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQMOeLs//T/0yuN17BwBsmt13LHG9sCU7AgBsmTv3/wDAv43+HwB2Hv0/AOw8+n8A2Hn0/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGyy48eOpUv1z5XlfJqfOru4MFM6e3CqUJ7Jzi7ks/nS/JnsdKk0XSxk86XZtpf+0OnvFUulM5Mxt3BuvFIoV8bLi0snZksLc5UTp2dz04UThYEtiwwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeldeXJrJFYuFeYmHJVEdrh+6B2V/Nj/x88Ef961X5qLTeOMT290yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwc/gkAAP//skMoxA==")
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0)
openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
setxattr(0x0, 0x0, 0x0, 0x0, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x29000)
[ 372.774714][T16442] syz-executor.1: attempt to access beyond end of device
[ 372.774714][T16442] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:23 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8)
sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00')
r1 = getpid()
sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e)
sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000340), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000480)=""/63, 0x3f}, {&(0x7f00000004c0)=""/164, 0xa4}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0xc0}, 0x0)
sched_setaffinity(0x0, 0xfffffffffffffea1, &(0x7f0000000200)=0x1000000000d)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = getpid()
getpgid(r8)
sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0)
r9 = syz_open_procfs$namespace(0x0, 0x0)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003400)={0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000000940)=ANY=[@ANYBLOB="1080090000009d681f500000000000ffff000038626e92a669d5b2d5003ad69dc6cb1cc49747e5c8fc5aff86aab9e2c081aaed478cbd3c879386a1325d3ee75ce98186697964e524974659261fc099c589aeb708b511"], 0x10}], 0x1}, 0x0)
ptrace$pokeuser(0x6, 0x0, 0x81, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, 0x0)
sendmsg$netlink(r7, &(0x7f0000000840)={&(0x7f00000001c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x80}, 0xc, &(0x7f0000000240)=[{&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x34}], 0x1, &(0x7f0000000c40)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES64, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r6, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYBLOB="000000000100008001000000000000000000", @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="650000009aa5f1c3391676da551c0000000000f9ffffffffffffff0000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYBLOB="fcfc3f6336d2a69e2bb9950fcde71a1d1b6eaebc694c19b457873d162815268793007f1902fbbf8b19b77c8180ffb1445c7e53199d804a28189810f1adcfa1d569e662378f31338144b3faeb9316fd7a97713f43b430a7810df61c970c8f78b1330098f03ec8eee5e63775fba2775b6596d0fecc44162214451acb4eb360eface1a342eaf2d859ec20b90d9b82d92282d845f2ab9d9d1e13fa322dfa30b0ff5c633233ffb797ad3728f9284aa4158e8314ff1cac819357afbc2c310dbc20aa", @ANYRES32=0xee01, @ANYRES32=r2, @ANYBLOB="eeffffff9198f015000800000100000001006dd54b560000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r10, @ANYRESDEC=r4, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6], 0x118, 0xc080}, 0x0)
sched_setscheduler(0x0, 0x5, &(0x7f0000000600)=0x5)
r11 = gettid()
fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff0000000000008067da969e00", @ANYRES32=r11, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRESDEC=r1], 0x40}}, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0)
04:59:23 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 92)
04:59:23 executing program 5:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000000000000002898bbb7c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd78000000008000000000000000"], 0x1, 0x793, &(0x7f0000001700)="$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")
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0)
mkdir(0x0, 0x0)
open(0x0, 0x0, 0x0)
writev(0xffffffffffffffff, 0x0, 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, 0x0)
connect$unix(0xffffffffffffffff, 0x0, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x29000)
04:59:23 executing program 3:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040))
pwritev2(r0, &(0x7f0000000200)=[{&(0x7f0000000240)='6', 0x1}], 0x1, 0x0, 0x0, 0x1c)
ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, 0x0)
04:59:23 executing program 4:
waitid(0x0, 0x0, 0x0, 0x80000008, 0x0)
rt_sigreturn()
waitid(0x0, 0x0, 0x0, 0x0, 0x0)
[ 372.814959][T16472] loop2: detected capacity change from 0 to 2048
[ 372.823082][T16472] EXT4-fs: Ignoring removed oldalloc option
[ 372.829818][T16472] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE
[ 372.851046][T16472] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
04:59:23 executing program 2:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000000000000002898bbb7c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd78000000008000000000000000"], 0x1, 0x793, &(0x7f0000001700)="$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")
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x29000)
[ 372.885321][ T27] audit: type=1400 audit(1699678763.655:387): avc: denied { append } for pid=16471 comm="syz-executor.2" path="/root/syzkaller-testdir2595261091/syzkaller.cy6qMz/731/file0/blkio.throttle.io_serviced_recursive" dev="loop2" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1
04:59:23 executing program 4:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000000000000002898bbb7c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd78000000008000000000000000"], 0x1, 0x793, &(0x7f0000001700)="$eJzs3c1rXFUbAPDnTpKmb9r3TV4QbF0FBA2UTkyNrYKLigsRLBR0bTtMpqFmkimZSWlCoBYR3AhaXAi66dqPunPrx1b/Bd2ISEvVtFhxISN3PjqTZiadtvloze8Htz3n3jM595l77zln5h7mBrBjjab/ZCL2R8R7ScRwY30SEQO1VH/E0Xq5myvL+XRJolp99bekVubGynI+2l6T2tPI7IuIb96OOJBZW295cWkmVywW5hv58crsmfHy4tLB07O56cJ0Ye7wxOTkoSPPHBncuFj/+H5p79X3X3ry86N/vfXo5Xe/TeJo7G1sa49jo4zGaOM9GUjfwlVe3OjKtlmy3TvAPUkvzb76VR77Yzj6aqne9F4SAHiQnI+IKgCwwyT6fwDYYZrfA9xYWc6nS/X89n4fsdWuvRARu+vxN+9v1rf0N+7Z7a7dBx26kay635FExMgG1D8aER9/+fqn6RKbdB8SoJM3L0TEyZHRZvvfan+SNXMW6nqfkPFUD2VGb8tr/2DrfJWOf55tjf9a11/m1vgnOox/Bjtcu/diNGJXe37t9Z+5sgHVdJWO/54faM1tu9kWf8NIXyP339qYbyA5dbpYSNu2/0XEWAwMpvmJdeoYu/739VUr+lrJ9vHf7xff+CStP/2/VSJzpf+2JncqV8ndb9xN1y5EPNbfKf7k1vFPuox/j/dYx8vPvfNRt21p/Gm8zWV1/Js/q6x6KeKJ6Bx/U7Le/MTD47XTYbx5UnTwxU8fDnWrv/34p0taf/OzwFZIj//Q+vGPJO3zNct3X8d3l4a/7rbtzvF3Pv93Ja/V0s3G41yuUpmfiNiVvLJ2/aHWa5v5Zvk0/rHHO1//653/6WfCkz3G33/118/uPf7NlcY/dVfH/+4Tl2/O9HWrv7fjP1lLjTXW9NL+9bqD9/PeAQAAAAAAAAAAAAAAAAAAAAAAAECvMhGxN5JM9lY6k8lm68/wfiSGMsVSuXLgVGlhbipqz8oeiYFM86cuh9t+D3Wi8Xv4zfyh2/JPR8T/I+KDwf/U8tl8qTi13cEDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQMOeLs//T/0yuN17BwBsmt13LHG9sCU7AgBsmTv3/wDAv43+HwB2Hv0/AOw8+n8A2Hn0/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGyy48eOpUv1z5XlfJqfOru4MFM6e3CqUJ7Jzi7ks/nS/JnsdKk0XSxk86XZtpf+0OnvFUulM5Mxt3BuvFIoV8bLi0snZksLc5UTp2dz04UThYEtiwwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeldeXJrJFYuFeYmHJVEdrh+6B2V/Nj/x88Ef961X5qLTeOMT290yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwc/gkAAP//skMoxA==")
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x29000)
04:59:23 executing program 3:
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000000000000002898bbb7c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd78000000008000000000000000"], 0x1, 0x793, &(0x7f0000001700)="$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")
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0)
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)
sched_setscheduler(0x0, 0x0, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f00000002c0))
sched_setscheduler(0x0, 0x2, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200))
connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
syz_open_pts(0xffffffffffffffff, 0x0)
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
listen(0xffffffffffffffff, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x29000)
[ 372.928119][ T3113] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 372.941090][T16482] loop1: detected capacity change from 0 to 2048
[ 372.949296][T16481] loop5: detected capacity change from 0 to 2048
[ 372.964305][T16481] EXT4-fs: Ignoring removed oldalloc option
[ 372.975699][T16481] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE
[ 372.986053][T16487] loop4: detected capacity change from 0 to 2048
[ 373.023074][T16489] loop2: detected capacity change from 0 to 2048
[ 373.031424][T16489] EXT4-fs: Ignoring removed oldalloc option
[ 373.048381][T16489] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE
[ 373.067078][T16487] EXT4-fs: Ignoring removed oldalloc option
[ 373.083294][T16487] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE
[ 373.146252][T16482] FAULT_INJECTION: forcing a failure.
[ 373.146252][T16482] name failslab, interval 1, probability 0, space 0, times 0
[ 373.159144][T16482] CPU: 0 PID: 16482 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 373.169323][T16482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 373.179745][T16482] Call Trace:
[ 373.183051][T16482]
[ 373.186003][T16482] dump_stack_lvl+0xda/0x130
[ 373.190653][T16482] dump_stack+0x15/0x20
[ 373.194929][T16482] should_fail_ex+0x21f/0x230
[ 373.199652][T16482] ? iter_file_splice_write+0xeb/0x7e0
[ 373.205304][T16482] __should_failslab+0x92/0xa0
[ 373.210117][T16482] should_failslab+0x9/0x20
[ 373.214757][T16482] __kmem_cache_alloc_node+0x4e/0x210
[ 373.220435][T16482] ? splice_from_pipe+0xe0/0xe0
[ 373.225386][T16482] ? iter_file_splice_write+0xeb/0x7e0
[ 373.231036][T16482] __kmalloc+0x95/0x1a0
[ 373.235430][T16482] iter_file_splice_write+0xeb/0x7e0
[ 373.240758][T16482] ? splice_from_pipe+0xe0/0xe0
[ 373.245758][T16482] direct_splice_actor+0x8a/0xb0
[ 373.250861][T16482] splice_direct_to_actor+0x31d/0x690
[ 373.256314][T16482] ? direct_file_splice_eof+0x70/0x70
[ 373.262255][T16482] do_splice_direct+0x10d/0x190
[ 373.267199][T16482] ? do_splice_direct+0x190/0x190
[ 373.272271][T16482] do_sendfile+0x3c4/0x980
[ 373.276737][T16482] __x64_sys_sendfile64+0x110/0x150
[ 373.282139][T16482] do_syscall_64+0x44/0x110
[ 373.286790][T16482] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 373.292848][T16482] RIP: 0033:0x7f8517f84ae9
[ 373.297274][T16482] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 373.316917][T16482] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 373.325384][T16482] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 373.333484][T16482] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 373.341880][T16482] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 373.342355][T16495] loop3: detected capacity change from 0 to 2048
[ 373.350278][T16482] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 373.350308][T16482] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 373.358376][T16495] EXT4-fs: Ignoring removed oldalloc option
[ 373.364897][T16482]
[ 373.373759][T16481] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 373.394222][T16494] wireguard0: entered promiscuous mode
[ 373.399776][T16494] wireguard0: entered allmulticast mode
[ 373.405599][T16495] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE
[ 373.418642][T16489] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
04:59:24 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 93)
04:59:24 executing program 2:
r0 = fsopen(&(0x7f0000000000)='debugfs\x00', 0x0)
fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0)
04:59:24 executing program 5:
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {0x0}}, 0x18)
[ 373.440321][T16487] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 373.441882][T16495] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 373.498100][T16505] loop1: detected capacity change from 0 to 2048
[ 373.500205][ T3113] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
04:59:24 executing program 3:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0x5452, &(0x7f0000000340)=ANY=[@ANYBLOB="01"])
[ 373.524568][ T27] audit: type=1400 audit(1699678764.295:388): avc: denied { mounton } for pid=16492 comm="syz-executor.3" path="/root/syzkaller-testdir2827549144/syzkaller.g6lfMr/868/file0/file0" dev="loop3" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1
[ 373.557215][ T3093] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 373.559850][ T3101] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 373.588423][ T3121] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[ 373.590677][ T27] audit: type=1400 audit(1699678764.365:389): avc: denied { mount } for pid=16506 comm="syz-executor.2" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1
[ 373.646151][T16505] FAULT_INJECTION: forcing a failure.
[ 373.646151][T16505] name failslab, interval 1, probability 0, space 0, times 0
[ 373.659181][T16505] CPU: 1 PID: 16505 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 373.669406][T16505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 373.679654][T16505] Call Trace:
[ 373.682963][T16505]
[ 373.685928][T16505] dump_stack_lvl+0xda/0x130
[ 373.690659][T16505] dump_stack+0x15/0x20
[ 373.694866][T16505] should_fail_ex+0x21f/0x230
[ 373.699594][T16505] ? __blockdev_direct_IO+0x137/0x1f90
[ 373.705127][T16505] __should_failslab+0x92/0xa0
[ 373.709970][T16505] should_failslab+0x9/0x20
[ 373.714561][T16505] kmem_cache_alloc+0x4e/0x250
[ 373.719474][T16505] __blockdev_direct_IO+0x137/0x1f90
[ 373.724943][T16505] ? __rcu_read_unlock+0x4d/0x70
[ 373.729975][T16505] ? find_get_entries+0x397/0x410
[ 373.735268][T16505] ? fat_block_truncate_page+0x40/0x40
[ 373.740748][T16505] ? invalidate_inode_pages2_range+0x6cc/0x720
[ 373.747326][T16505] fat_direct_IO+0x110/0x1d0
[ 373.751981][T16505] generic_file_direct_write+0xab/0x1f0
[ 373.757579][T16505] ? mnt_put_write_access_file+0x95/0xb0
[ 373.763323][T16505] __generic_file_write_iter+0xae/0x120
[ 373.768935][T16505] generic_file_write_iter+0x7d/0x1c0
[ 373.774345][T16505] do_iter_write+0x4ad/0x770
[ 373.779094][T16505] ? iter_file_splice_write+0xeb/0x7e0
[ 373.784573][T16505] vfs_iter_write+0x56/0x70
[ 373.789143][T16505] iter_file_splice_write+0x462/0x7e0
[ 373.794737][T16505] ? splice_from_pipe+0xe0/0xe0
[ 373.799672][T16505] direct_splice_actor+0x8a/0xb0
[ 373.804655][T16505] splice_direct_to_actor+0x31d/0x690
[ 373.810046][T16505] ? direct_file_splice_eof+0x70/0x70
[ 373.815521][T16505] do_splice_direct+0x10d/0x190
[ 373.820453][T16505] ? do_splice_direct+0x190/0x190
[ 373.825508][T16505] do_sendfile+0x3c4/0x980
[ 373.829948][T16505] __x64_sys_sendfile64+0x110/0x150
[ 373.835290][T16505] do_syscall_64+0x44/0x110
[ 373.839897][T16505] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 373.846704][T16505] RIP: 0033:0x7f8517f84ae9
[ 373.851389][T16505] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 373.872330][T16505] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 373.881141][T16505] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 373.889340][T16505] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
04:59:24 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8)
sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00')
r1 = getpid()
sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e)
sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000340), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000480)=""/63, 0x3f}, {&(0x7f00000004c0)=""/164, 0xa4}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0xc0}, 0x0)
sched_setaffinity(0x0, 0xfffffffffffffea1, &(0x7f0000000200)=0x1000000000d)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = getpid()
getpgid(r8)
sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0)
r9 = syz_open_procfs$namespace(0x0, 0x0)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003400)={0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000000940)=ANY=[@ANYBLOB="1080090000009d681f500000000000ffff000038626e92a669d5b2d5003ad69dc6cb1cc49747e5c8fc5aff86aab9e2c081aaed478cbd3c879386a1325d3ee75ce98186697964e524974659261fc099c589aeb708b511"], 0x10}], 0x1}, 0x0)
ptrace$pokeuser(0x6, 0x0, 0x81, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, 0x0)
sendmsg$netlink(r7, &(0x7f0000000840)={&(0x7f00000001c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x80}, 0xc, &(0x7f0000000240)=[{&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x34}], 0x1, &(0x7f0000000c40)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES64, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r6, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYBLOB="000000000100008001000000000000000000", @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="650000009aa5f1c3391676da551c0000000000f9ffffffffffffff0000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYBLOB="fcfc3f6336d2a69e2bb9950fcde71a1d1b6eaebc694c19b457873d162815268793007f1902fbbf8b19b77c8180ffb1445c7e53199d804a28189810f1adcfa1d569e662378f31338144b3faeb9316fd7a97713f43b430a7810df61c970c8f78b1330098f03ec8eee5e63775fba2775b6596d0fecc44162214451acb4eb360eface1a342eaf2d859ec20b90d9b82d92282d845f2ab9d9d1e13fa322dfa30b0ff5c633233ffb797ad3728f9284aa4158e8314ff1cac819357afbc2c310dbc20aa", @ANYRES32=0xee01, @ANYRES32=r2, @ANYBLOB="eeffffff9198f015000800000100000001006dd54b560000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r10, @ANYRESDEC=r4, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6], 0x118, 0xc080}, 0x0)
sched_setscheduler(0x0, 0x5, &(0x7f0000000600)=0x5)
r11 = gettid()
fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff0000000000008067da969e00", @ANYRES32=r11, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRESDEC=r1], 0x40}}, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0)
04:59:24 executing program 4:
lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee00)
04:59:24 executing program 3:
r0 = fsopen(&(0x7f0000000040)='cifs\x00', 0x0)
ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
fsconfig$FSCONFIG_SET_BINARY(r0, 0x8, 0x0, 0x0, 0x0)
04:59:24 executing program 2:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'})
04:59:24 executing program 5:
get_robust_list(0x0, &(0x7f0000000c00)=0x0, &(0x7f0000000c40))
04:59:24 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 94)
[ 373.897317][T16505] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 373.905344][T16505] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 373.913410][T16505] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 373.921426][T16505]
04:59:24 executing program 2:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0xffff})
04:59:24 executing program 5:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0xaa11eac3f3af0b91, r0, 0x0)
04:59:24 executing program 4:
r0 = syz_io_uring_setup(0x5022, &(0x7f0000000800)={0x0, 0x0, 0x40}, &(0x7f0000000880), &(0x7f00000008c0))
io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0xc, 0x0, 0x0)
[ 373.983370][T16519] loop1: detected capacity change from 0 to 2048
[ 374.174351][T16534] wireguard0: entered promiscuous mode
[ 374.179998][T16534] wireguard0: entered allmulticast mode
04:59:25 executing program 5:
chmod(&(0x7f0000007140)='./file0\x00', 0x0)
04:59:25 executing program 2:
r0 = fsopen(&(0x7f00000000c0)='cgroup2\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000100)='*:\x00', &(0x7f0000000140)='nfs4\x00', 0x0)
04:59:25 executing program 4:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, 0x0)
[ 374.681317][T16519] syz-executor.1: attempt to access beyond end of device
[ 374.681317][T16519] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:25 executing program 3:
openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0)
04:59:25 executing program 2:
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x430781, 0x0)
readv(r0, 0x0, 0x0)
04:59:25 executing program 5:
r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x40049409, 0x0)
04:59:25 executing program 4:
openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x430781, 0x0)
04:59:25 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 95)
04:59:25 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8)
sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00')
r1 = getpid()
sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e)
sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000340), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000480)=""/63, 0x3f}, {&(0x7f00000004c0)=""/164, 0xa4}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0xc0}, 0x0)
sched_setaffinity(0x0, 0xfffffffffffffea1, &(0x7f0000000200)=0x1000000000d)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = getpid()
getpgid(r8)
sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0)
r9 = syz_open_procfs$namespace(0x0, 0x0)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003400)={0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000000940)=ANY=[@ANYBLOB="1080090000009d681f500000000000ffff000038626e92a669d5b2d5003ad69dc6cb1cc49747e5c8fc5aff86aab9e2c081aaed478cbd3c879386a1325d3ee75ce98186697964e524974659261fc099c589aeb708b511"], 0x10}], 0x1}, 0x0)
ptrace$pokeuser(0x6, 0x0, 0x81, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, 0x0)
sendmsg$netlink(r7, &(0x7f0000000840)={&(0x7f00000001c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x80}, 0xc, &(0x7f0000000240)=[{&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x34}], 0x1, &(0x7f0000000c40)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES64, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r6, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYBLOB="000000000100008001000000000000000000", @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="650000009aa5f1c3391676da551c0000000000f9ffffffffffffff0000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYBLOB="fcfc3f6336d2a69e2bb9950fcde71a1d1b6eaebc694c19b457873d162815268793007f1902fbbf8b19b77c8180ffb1445c7e53199d804a28189810f1adcfa1d569e662378f31338144b3faeb9316fd7a97713f43b430a7810df61c970c8f78b1330098f03ec8eee5e63775fba2775b6596d0fecc44162214451acb4eb360eface1a342eaf2d859ec20b90d9b82d92282d845f2ab9d9d1e13fa322dfa30b0ff5c633233ffb797ad3728f9284aa4158e8314ff1cac819357afbc2c310dbc20aa", @ANYRES32=0xee01, @ANYRES32=r2, @ANYBLOB="eeffffff9198f015000800000100000001006dd54b560000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r10, @ANYRESDEC=r4, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6], 0x118, 0xc080}, 0x0)
sched_setscheduler(0x0, 0x5, &(0x7f0000000600)=0x5)
r11 = gettid()
fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff0000000000008067da969e00", @ANYRES32=r11, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRESDEC=r1], 0x40}}, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0)
04:59:25 executing program 3:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000240)={{0x1, 0x1, 0x18}, './file0/file0\x00'})
04:59:25 executing program 2:
r0 = epoll_create1(0x0)
epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x17e, &(0x7f0000000080)={[0x19d]}, 0x8)
04:59:25 executing program 4:
openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0)
04:59:25 executing program 5:
r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0)
04:59:25 executing program 3:
r0 = syz_io_uring_setup(0x5022, &(0x7f0000000800), &(0x7f0000000880), &(0x7f00000008c0))
io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x9, 0x0, 0x0)
[ 374.844058][T16548] loop1: detected capacity change from 0 to 2048
04:59:25 executing program 3:
r0 = syz_open_procfs$userns(0x0, &(0x7f0000000280))
r1 = dup2(r0, r0)
writev(r1, 0x0, 0x0)
[ 375.066088][T16570] wireguard0: entered promiscuous mode
[ 375.071798][T16570] wireguard0: entered allmulticast mode
[ 375.575569][T16548] syz-executor.1: attempt to access beyond end of device
[ 375.575569][T16548] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:26 executing program 0:
r0 = syz_io_uring_setup(0x5022, &(0x7f0000000800), &(0x7f0000000880), &(0x7f00000008c0))
io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x4, 0x0, 0x0)
04:59:26 executing program 3:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, &(0x7f00000004c0)={[{@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffbdc}}, {@iocharset={'iocharset', 0x3d, 'cp950'}}, {@rodir}, {@fat=@tz_utc}, {@uni_xlateno}, {@shortname_mixed}, {@fat=@debug}, {@fat=@codepage={'codepage', 0x3d, '775'}}, {@shortname_lower}, {@fat=@errors_remount}, {@shortname_winnt}, {@rodir}, {@utf8no}, {@uni_xlate}]}, 0x1, 0x25f, &(0x7f0000000240)="$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")
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:59:26 executing program 4:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0x5452, &(0x7f0000000340)=ANY=[])
04:59:26 executing program 5:
mknodat$null(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x103)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
04:59:26 executing program 2:
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x430781, 0x0)
lseek(r0, 0xfffffffffffffffc, 0x0)
04:59:26 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 96)
04:59:26 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:26 executing program 2:
rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00')
04:59:26 executing program 5:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0x5421, &(0x7f0000000340)=ANY=[])
04:59:26 executing program 0:
r0 = fsopen(&(0x7f00000001c0)='autofs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
[ 375.710389][T16584] loop3: detected capacity change from 0 to 256
[ 375.729970][T16583] loop1: detected capacity change from 0 to 2048
[ 375.749507][T16584] FAT-fs (loop3): codepage cp775 not found
04:59:26 executing program 2:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0)
04:59:26 executing program 5:
r0 = syz_open_procfs$userns(0x0, &(0x7f0000000280))
fcntl$getownex(r0, 0x4, &(0x7f0000000480))
04:59:26 executing program 3:
openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/notes', 0x820082, 0x0)
04:59:26 executing program 0:
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x430781, 0x0)
fallocate(r0, 0x0, 0x0, 0x8)
[ 375.792964][T16595] loop4: detected capacity change from 0 to 256
04:59:26 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:26 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:26 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
[ 375.908618][T16608] loop4: detected capacity change from 0 to 256
[ 375.916615][T16611] loop2: detected capacity change from 0 to 256
[ 375.932513][T16612] loop3: detected capacity change from 0 to 256
04:59:26 executing program 0:
r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x5450, 0x0)
04:59:26 executing program 5:
epoll_create1(0x57c7f87aa62065b1)
04:59:26 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:26 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:26 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:26 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 97)
04:59:26 executing program 0:
unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs2/custom0\x00')
[ 376.170364][T16583] syz-executor.1: attempt to access beyond end of device
[ 376.170364][T16583] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:27 executing program 5:
r0 = fsopen(&(0x7f0000000040)='nfsd\x00', 0x0)
fsconfig$FSCONFIG_SET_BINARY(r0, 0x8, 0x0, 0x0, 0x0)
04:59:27 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:27 executing program 0:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc018937b, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018"])
[ 376.213850][T16618] loop2: detected capacity change from 0 to 256
[ 376.219382][T16621] loop3: detected capacity change from 0 to 256
[ 376.230846][T16619] loop4: detected capacity change from 0 to 256
04:59:27 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:27 executing program 0:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0x40086602, &(0x7f0000000340)=ANY=[])
04:59:27 executing program 5:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'})
04:59:27 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
[ 376.299157][T16631] loop3: detected capacity change from 0 to 256
04:59:27 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
[ 376.345591][T16633] loop1: detected capacity change from 0 to 2048
[ 376.377812][T16639] loop2: detected capacity change from 0 to 256
[ 376.387270][T16641] loop4: detected capacity change from 0 to 256
04:59:27 executing program 5:
r0 = syz_open_procfs$userns(0x0, &(0x7f0000000280))
fcntl$getownex(r0, 0x11, &(0x7f0000000480))
04:59:27 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
[ 376.397680][ T27] audit: type=1400 audit(1699678767.165:390): avc: denied { setattr } for pid=16637 comm="syz-executor.0" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1
[ 376.434940][T16645] loop3: detected capacity change from 0 to 256
[ 376.491393][T16648] loop2: detected capacity change from 0 to 256
04:59:27 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 98)
04:59:27 executing program 0:
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x430781, 0x0)
write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}}}, 0x38)
fallocate(r0, 0x0, 0x0, 0x8)
04:59:27 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68)
04:59:27 executing program 5:
syz_io_uring_setup(0xeca, &(0x7f0000000100)={0x0, 0x254, 0x8}, 0x0, 0x0)
04:59:27 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
04:59:27 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
[ 376.694528][T16633] syz-executor.1: attempt to access beyond end of device
[ 376.694528][T16633] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 376.729309][T16653] loop4: detected capacity change from 0 to 256
[ 376.729851][T16651] loop3: detected capacity change from 0 to 256
04:59:27 executing program 0:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x410002, 0x0)
04:59:27 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rmdir(&(0x7f0000000140)='./file0\x00')
04:59:27 executing program 5:
r0 = fsopen(&(0x7f0000000080)='msdos\x00', 0x0)
fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='dirsync\x00', 0x0, 0x0)
04:59:27 executing program 5:
mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8004, 0x0)
04:59:27 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68)
[ 376.786763][T16657] loop2: detected capacity change from 0 to 256
04:59:27 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
[ 376.848250][T16665] loop3: detected capacity change from 0 to 256
[ 376.891786][T16671] loop4: detected capacity change from 0 to 256
[ 376.892532][T16666] loop1: detected capacity change from 0 to 2048
[ 376.911468][T16672] loop2: detected capacity change from 0 to 256
04:59:28 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rmdir(&(0x7f0000000140)='./file0\x00')
04:59:28 executing program 0:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000340)=ANY=[@ANYBLOB="0100000001", @ANYRES32])
04:59:28 executing program 5:
r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000080))
ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x40049409, 0x0)
04:59:28 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68)
04:59:28 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 99)
04:59:28 executing program 2:
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
[ 377.199834][T16666] syz-executor.1: attempt to access beyond end of device
[ 377.199834][T16666] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:28 executing program 2:
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
04:59:28 executing program 5:
r0 = syz_open_procfs$userns(0x0, &(0x7f0000000280))
dup2(r0, 0xffffffffffffffff)
[ 377.237800][T16681] autofs4:pid:16681:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.4294967041), cmd(0xc0189373)
[ 377.239894][T16679] loop3: detected capacity change from 0 to 256
[ 377.252061][T16681] autofs4:pid:16681:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc0189373)
[ 377.276144][T16684] loop4: detected capacity change from 0 to 256
04:59:28 executing program 2:
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
04:59:28 executing program 0:
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f00000003c0)='\"', &(0x7f0000000400)='./file0\x00', 0xffffffffffffff9c)
04:59:28 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rmdir(&(0x7f0000000140)='./file0\x00')
04:59:28 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(0x0, &(0x7f00000026c0)='./file1\x00')
04:59:28 executing program 0:
r0 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0)
ftruncate(r0, 0x2007ffb)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x147042, 0x0)
sendfile(r1, r1, 0x0, 0x1000000201005)
lseek(r1, 0x0, 0x4)
04:59:28 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(0x0, &(0x7f00000026c0)='./file1\x00')
[ 377.342835][T16683] loop1: detected capacity change from 0 to 2048
[ 377.369392][T16695] loop2: detected capacity change from 0 to 256
04:59:28 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:28 executing program 5:
mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000006d00)={0x70}, 0x20)
[ 377.399090][T16697] loop3: detected capacity change from 0 to 256
[ 377.416303][T16700] loop2: detected capacity change from 0 to 256
[ 377.439621][T16683] FAULT_INJECTION: forcing a failure.
[ 377.439621][T16683] name failslab, interval 1, probability 0, space 0, times 0
[ 377.452480][T16683] CPU: 1 PID: 16683 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 377.462595][T16683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 377.472684][T16683] Call Trace:
[ 377.475988][T16683]
[ 377.478921][T16683] dump_stack_lvl+0xda/0x130
[ 377.483525][T16683] dump_stack+0x15/0x20
[ 377.487702][T16683] should_fail_ex+0x21f/0x230
[ 377.492474][T16683] ? iter_file_splice_write+0xeb/0x7e0
[ 377.497978][T16683] __should_failslab+0x92/0xa0
[ 377.502891][T16683] should_failslab+0x9/0x20
[ 377.507420][T16683] __kmem_cache_alloc_node+0x4e/0x210
[ 377.512880][T16683] ? splice_from_pipe+0xe0/0xe0
[ 377.518031][T16683] ? iter_file_splice_write+0xeb/0x7e0
[ 377.523552][T16683] __kmalloc+0x95/0x1a0
[ 377.527764][T16683] iter_file_splice_write+0xeb/0x7e0
[ 377.533160][T16683] ? splice_from_pipe+0xe0/0xe0
[ 377.538127][T16683] direct_splice_actor+0x8a/0xb0
[ 377.543085][T16683] splice_direct_to_actor+0x31d/0x690
[ 377.548552][T16683] ? direct_file_splice_eof+0x70/0x70
[ 377.553972][T16683] do_splice_direct+0x10d/0x190
[ 377.559013][T16683] ? do_splice_direct+0x190/0x190
[ 377.564056][T16683] do_sendfile+0x3c4/0x980
[ 377.568513][T16683] __x64_sys_sendfile64+0x110/0x150
[ 377.574066][T16683] do_syscall_64+0x44/0x110
[ 377.578717][T16683] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 377.584690][T16683] RIP: 0033:0x7f8517f84ae9
[ 377.589143][T16683] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 377.608960][T16683] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 377.617701][T16683] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 377.625700][T16683] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
04:59:28 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 100)
04:59:28 executing program 3:
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
04:59:28 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(0x0, &(0x7f00000026c0)='./file1\x00')
[ 377.633796][T16683] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 377.641909][T16683] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002
[ 377.649969][T16683] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 377.658046][T16683]
04:59:28 executing program 5:
syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/ipc\x00')
04:59:28 executing program 3:
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
[ 377.718812][T16706] loop4: detected capacity change from 0 to 256
04:59:28 executing program 3:
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
04:59:28 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:28 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(0x0, &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
[ 377.763660][T16711] loop2: detected capacity change from 0 to 256
[ 377.791781][T16710] loop1: detected capacity change from 0 to 2048
[ 377.858865][T16719] loop4: detected capacity change from 0 to 256
[ 377.881811][T16721] loop3: detected capacity change from 0 to 256
[ 377.901006][T16710] FAULT_INJECTION: forcing a failure.
[ 377.901006][T16710] name failslab, interval 1, probability 0, space 0, times 0
[ 377.913713][T16710] CPU: 0 PID: 16710 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0
[ 377.923871][T16710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 377.934043][T16710] Call Trace:
[ 377.937416][T16710]
[ 377.940374][T16710] dump_stack_lvl+0xda/0x130
[ 377.945073][T16710] dump_stack+0x15/0x20
[ 377.949271][T16710] should_fail_ex+0x21f/0x230
[ 377.954078][T16710] ? __blockdev_direct_IO+0x137/0x1f90
[ 377.959567][T16710] __should_failslab+0x92/0xa0
[ 377.964565][T16710] should_failslab+0x9/0x20
[ 377.969204][T16710] kmem_cache_alloc+0x4e/0x250
[ 377.974202][T16710] __blockdev_direct_IO+0x137/0x1f90
[ 377.979673][T16710] ? __rcu_read_unlock+0x4d/0x70
[ 377.984954][T16710] ? find_get_entries+0x397/0x410
[ 377.990204][T16710] ? fat_block_truncate_page+0x40/0x40
[ 377.995692][T16710] ? invalidate_inode_pages2_range+0x6cc/0x720
[ 378.002125][T16710] fat_direct_IO+0x110/0x1d0
[ 378.006962][T16710] generic_file_direct_write+0xab/0x1f0
[ 378.012577][T16710] ? mnt_put_write_access_file+0x95/0xb0
[ 378.018296][T16710] __generic_file_write_iter+0xae/0x120
[ 378.023887][T16710] generic_file_write_iter+0x7d/0x1c0
[ 378.029385][T16710] do_iter_write+0x4ad/0x770
[ 378.034019][T16710] ? iter_file_splice_write+0xeb/0x7e0
[ 378.039607][T16710] vfs_iter_write+0x56/0x70
[ 378.044147][T16710] iter_file_splice_write+0x462/0x7e0
[ 378.049574][T16710] ? splice_from_pipe+0xe0/0xe0
[ 378.054772][T16710] direct_splice_actor+0x8a/0xb0
[ 378.059823][T16710] splice_direct_to_actor+0x31d/0x690
[ 378.065234][T16710] ? direct_file_splice_eof+0x70/0x70
[ 378.070803][T16710] do_splice_direct+0x10d/0x190
[ 378.075720][T16710] ? do_splice_direct+0x190/0x190
[ 378.081060][T16710] do_sendfile+0x3c4/0x980
[ 378.085640][T16710] __x64_sys_sendfile64+0x110/0x150
[ 378.090905][T16710] do_syscall_64+0x44/0x110
[ 378.095553][T16710] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 378.101515][T16710] RIP: 0033:0x7f8517f84ae9
[ 378.105939][T16710] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 378.125840][T16710] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 378.134330][T16710] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9
[ 378.142323][T16710] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005
[ 378.150330][T16710] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000
[ 378.158464][T16710] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000003
[ 378.166641][T16710] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38
[ 378.174642][T16710]
04:59:29 executing program 0:
r0 = fsopen(&(0x7f0000000040)='binder\x00', 0x0)
fsconfig$FSCONFIG_SET_BINARY(r0, 0x8, 0x0, 0x0, 0x0)
04:59:29 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0)
04:59:29 executing program 5:
openat$random(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0)
04:59:29 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:29 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(0x0, &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
04:59:29 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67)
04:59:29 executing program 5:
openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x26802, 0x0)
04:59:29 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:29 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0)
04:59:29 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(0x0, &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
[ 378.259482][T16724] loop2: detected capacity change from 0 to 256
[ 378.276123][T16726] loop4: detected capacity change from 0 to 256
[ 378.294246][T16734] loop3: detected capacity change from 0 to 256
04:59:29 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_mcast\x00')
preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000000)=""/201, 0xc9}], 0x1, 0xb8, 0x0)
04:59:29 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
[ 378.336817][T16731] loop1: detected capacity change from 0 to 2048
[ 378.349719][T16738] loop0: detected capacity change from 0 to 256
[ 378.370657][T16741] loop3: detected capacity change from 0 to 256
[ 378.371701][T16742] loop2: detected capacity change from 0 to 256
04:59:29 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:29 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0)
rmdir(&(0x7f0000000140)='./file0\x00')
04:59:29 executing program 5:
r0 = socket$igmp(0x2, 0x3, 0x2)
sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_tos_int={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x30}}], 0x1, 0x0)
04:59:29 executing program 2:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0)
[ 378.440826][T16746] loop4: detected capacity change from 0 to 256
04:59:29 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6)
sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5)
fcntl$setownex(0xffffffffffffffff, 0xf, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300))
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e)
r2 = getpid()
sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x3)
sched_setscheduler(r2, 0x0, &(0x7f0000000440)=0x8)
sendmmsg$unix(r1, &(0x7f00000bd000), 0xbb, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xc7b)
recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
connect$unix(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$netlink(0x10, 0x3, 0xa)
sched_setaffinity(0x0, 0x8, &(0x7f0000000480)=0x1)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000540)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x59})
socket$inet6(0xa, 0x401000000001, 0x0)
r4 = dup(r3)
r5 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x2)
ftruncate(r5, 0x200004)
sendfile(r4, r5, 0x0, 0x80001d00c0d1)
[ 378.481414][T16749] loop0: detected capacity change from 0 to 256
[ 378.504602][T16753] loop2: detected capacity change from 0 to 256
[ 378.523168][T16755] loop3: detected capacity change from 0 to 256
04:59:29 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0)
rmdir(&(0x7f0000000140)='./file0\x00')
04:59:29 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:29 executing program 2:
r0 = socket$igmp(0x2, 0x3, 0x2)
sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0xc, 0x7, 0x3, 0x0, [{@broadcast}]}]}}}], 0x20}}], 0x1, 0x0)
04:59:29 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:29 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff66)
[ 378.771527][T16731] syz-executor.1: attempt to access beyond end of device
[ 378.771527][T16731] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 378.809943][T16760] loop0: detected capacity change from 0 to 256
04:59:29 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='totmaps\x00')
preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000000)=""/201, 0xc9}], 0x1, 0xb8, 0x0)
04:59:29 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0)
rmdir(&(0x7f0000000140)='./file0\x00')
[ 378.815668][T16762] loop3: detected capacity change from 0 to 256
[ 378.832792][T16763] loop4: detected capacity change from 0 to 256
04:59:29 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
[ 378.864858][T16767] loop1: detected capacity change from 0 to 2048
04:59:29 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:29 executing program 2:
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x389801, 0x0)
fallocate(r0, 0x0, 0x0, 0x0)
[ 378.908163][T16770] loop3: detected capacity change from 0 to 256
[ 378.935866][T16773] loop0: detected capacity change from 0 to 256
04:59:29 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x16, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0)
[ 378.970623][T16776] loop4: detected capacity change from 0 to 256
[ 379.232570][T16767] syz-executor.1: attempt to access beyond end of device
[ 379.232570][T16767] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:30 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001900010000000000008000000a00000000000000000000000c000900080000003c"], 0x28}}, 0x0)
04:59:30 executing program 4:
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:30 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(0x0)
04:59:30 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x6)
bind$netlink(r0, &(0x7f0000001080)={0x10, 0x0, 0x25dfdbfb, 0x100000}, 0xc)
04:59:30 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r0, &(0x7f0000000200), 0xf000)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:30 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff68)
04:59:30 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(0x0)
04:59:30 executing program 4:
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:30 executing program 2:
prlimit64(0x0, 0xe, 0x0, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080))
sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5)
fcntl$setownex(0xffffffffffffffff, 0xf, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
getpgid(0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e)
getpid()
sched_setscheduler(0x0, 0x0, 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
sendmmsg$unix(r1, &(0x7f00000bd000), 0xbb, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0)
connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e)
r3 = socket$netlink(0x10, 0x3, 0xa)
sched_setaffinity(0x0, 0x8, &(0x7f0000000480)=0x1)
syz_clone3(0x0, 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000540)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x59})
socket$inet6(0xa, 0x401000000001, 0x0)
r4 = dup(r3)
r5 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x2)
ftruncate(r5, 0x200004)
sendfile(r4, r5, 0x0, 0x80001d00c0d1)
04:59:30 executing program 5:
r0 = socket$igmp(0x2, 0x3, 0x2)
sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000003280)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0xf}}], 0x1, 0x0)
[ 379.369413][T16786] loop0: detected capacity change from 0 to 256
[ 379.373212][T16787] loop3: detected capacity change from 0 to 256
[ 379.385773][ T27] audit: type=1400 audit(1699678770.155:391): avc: denied { bind } for pid=16780 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 379.394895][T16785] loop1: detected capacity change from 0 to 2048
04:59:30 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r0, &(0x7f0000000200), 0xf000)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:30 executing program 4:
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:30 executing program 5:
r0 = socket$igmp(0x2, 0x3, 0x2)
sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000003280)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0xf}}], 0x1, 0x0)
04:59:30 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(0x0, &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
[ 379.499841][T16799] loop3: detected capacity change from 0 to 256
04:59:30 executing program 3:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(0x0)
04:59:30 executing program 5:
r0 = socket$igmp(0x2, 0x3, 0x2)
sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000003280)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0xf}}], 0x1, 0x0)
04:59:30 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
chdir(0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r0, &(0x7f0000000200), 0xf000)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
[ 379.549335][T16803] loop0: detected capacity change from 0 to 256
[ 379.577355][T16808] loop4: detected capacity change from 0 to 256
[ 379.644194][T16813] loop3: detected capacity change from 0 to 256
[ 379.661454][T16815] loop0: detected capacity change from 0 to 256
04:59:30 executing program 5:
r0 = socket$igmp(0x2, 0x3, 0x2)
sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000003280)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0xf}}], 0x1, 0x0)
04:59:30 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(0x0, &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:30 executing program 3:
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000000)={[{@dax}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@noquota}]}, 0x1, 0x44d, &(0x7f0000000580)="$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")
[ 379.838007][T16785] syz-executor.1: attempt to access beyond end of device
[ 379.838007][T16785] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 379.882769][T16820] loop4: detected capacity change from 0 to 256
[ 379.888382][T16821] loop3: detected capacity change from 0 to 512
[ 379.901961][T16821] EXT4-fs: dax option not supported
04:59:31 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
open(&(0x7f0000000200)='./file0\x00', 0x8000, 0x10)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8)
04:59:31 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:31 executing program 5:
unshare(0x8000000)
unshare(0xa000000)
04:59:31 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(0x0, &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:31 executing program 2:
mknod(&(0x7f00000000c0)='./file0\x00', 0x8876, 0x40000800)
r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1)
04:59:31 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
04:59:31 executing program 2:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
sendmmsg(r1, &(0x7f0000000040), 0x10, 0x0)
recvmsg(r0, &(0x7f0000000300)={0x0, 0xfffffc9e, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/58, 0x3a}], 0x1}, 0x0)
04:59:31 executing program 5:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev}, 0x10)
sendmmsg$inet(r1, &(0x7f0000000ec0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, 0x0}}], 0x1, 0x2000c044)
sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
04:59:31 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
[ 380.319266][T16824] loop0: detected capacity change from 0 to 256
[ 380.341529][T16833] loop4: detected capacity change from 0 to 256
04:59:31 executing program 5:
r0 = socket(0x18, 0x1, 0x0)
connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c)
r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0)
pwritev(r1, &(0x7f0000000480)=[{&(0x7f0000000880)="a7", 0x1}], 0x1, 0x0, 0x0)
getsockname$inet(r0, &(0x7f00000000c0), &(0x7f0000000000)=0xffffffffffffff35)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5)
r2 = socket(0x18, 0x1, 0x0)
close(r2)
r3 = socket(0x2, 0x2, 0x0)
dup2(r0, r3)
connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x6}, 0x1c)
04:59:31 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0)
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:31 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
[ 380.366027][T16830] loop1: detected capacity change from 0 to 2048
[ 380.442421][T16845] loop4: detected capacity change from 0 to 256
04:59:31 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") (async)
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
open(&(0x7f0000000200)='./file0\x00', 0x8000, 0x10) (async)
open(&(0x7f0000000200)='./file0\x00', 0x8000, 0x10)
open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8)
04:59:31 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:31 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
04:59:31 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4)
sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)="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", 0x62a}], 0x1}}], 0x1, 0x0)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4)
sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27)
04:59:31 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0)
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:31 executing program 2:
socketpair(0x18, 0x0, 0x8000, &(0x7f0000000240))
04:59:31 executing program 3:
readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
04:59:31 executing program 2:
r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0xf, 0xa001)
ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000000)={0x0, 0x1, [{0x0, 0x1}]})
[ 380.709566][T16830] syz-executor.1: attempt to access beyond end of device
[ 380.709566][T16830] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 380.744149][T16853] loop4: detected capacity change from 0 to 256
[ 380.751951][T16855] loop0: detected capacity change from 0 to 256
04:59:31 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:31 executing program 3:
readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
04:59:31 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0)
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
[ 380.840211][ T27] audit: type=1400 audit(1699678771.615:392): avc: denied { write } for pid=16862 comm="syz-executor.2" name="001" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1
[ 380.872059][T16868] loop0: detected capacity change from 0 to 256
04:59:31 executing program 3:
readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
[ 380.888055][T16866] loop4: detected capacity change from 0 to 256
[ 380.898849][T16860] loop1: detected capacity change from 0 to 2048
04:59:32 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") (async)
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async, rerun: 32)
open(&(0x7f0000000200)='./file0\x00', 0x8000, 0x10) (async, rerun: 32)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200) (async, rerun: 32)
sendfile(r1, r2, 0x0, 0x7fffff67) (rerun: 32)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8)
04:59:32 executing program 5:
r0 = socket(0x18, 0x0, 0x0)
recvmsg$can_j1939(r0, &(0x7f0000000a00)={&(0x7f0000000500)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f00000008c0)=[{0x0}, {0x0}], 0x2}, 0x102)
04:59:32 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
socket$nl_audit(0x10, 0x3, 0x9)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
04:59:32 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:32 executing program 3:
r0 = syz_open_procfs(0x0, 0x0)
readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
04:59:32 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:32 executing program 5:
r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x0)
read$usbfs(r0, &(0x7f0000000200)=""/249, 0xf9)
04:59:32 executing program 3:
r0 = syz_open_procfs(0x0, 0x0)
readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
04:59:32 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0)
bind$netlink(r0, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc)
04:59:32 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
[ 381.671676][ T27] audit: type=1400 audit(1699678772.445:393): avc: denied { read } for pid=16875 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1
[ 381.679784][T16881] loop4: detected capacity change from 0 to 256
[ 381.702090][T16884] loop0: detected capacity change from 0 to 256
04:59:32 executing program 3:
r0 = syz_open_procfs(0x0, 0x0)
readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
04:59:32 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext, 0x81002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[], 0x1, 0x541, &(0x7f0000000d40)="$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")
r0 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r0, &(0x7f0000000600)="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", 0x200)
sendfile(r0, r1, 0x0, 0x7fffff67)
04:59:32 executing program 3:
syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
04:59:32 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
[ 381.784708][T16895] loop4: detected capacity change from 0 to 256
[ 381.819965][T16899] loop1: detected capacity change from 0 to 2048
[ 381.875115][T16904] loop0: detected capacity change from 0 to 256
04:59:32 executing program 3:
syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
04:59:32 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:32 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
bind$netlink(r0, &(0x7f0000000280), 0xc)
04:59:32 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:32 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
socket$nl_audit(0x10, 0x3, 0x9)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
04:59:32 executing program 3:
syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1)
04:59:32 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f00000006c0)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xca0, 0x8, 0x0, 0x1, [{0xa10, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x1d8, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x26}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x5c, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x238, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x44}}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x548, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x35}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7ff}]}, {0x258, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "80519ee09bcc7eca031f1842a075a5f26aeeb0be2f2e517f4a54fe410b37a029"}, @WGPEER_A_ALLOWEDIPS={0x220, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}]}]}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PEERS={0x20c, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_FLAGS={0x8}]}, {0x1f4, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "91a14b7f2ff70b40dd2c2d493b8d135e8d35fdc12a11fe95861754b5792b4c7e"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_ALLOWEDIPS={0x194, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3b}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}]}]}]}, 0xec8}}, 0x0)
04:59:32 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
[ 382.009790][T16910] loop0: detected capacity change from 0 to 256
[ 382.015900][T16912] loop4: detected capacity change from 0 to 256
04:59:32 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
[ 382.123644][T16923] loop4: detected capacity change from 0 to 256
[ 382.130188][T16924] loop0: detected capacity change from 0 to 256
04:59:33 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext, 0x81002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getuid() (async)
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[], 0x1, 0x541, &(0x7f0000000d40)="$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") (async, rerun: 32)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async, rerun: 32)
r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r0, &(0x7f0000000600)="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", 0x200) (async)
sendfile(r0, r1, 0x0, 0x7fffff67)
04:59:33 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, 0x0, 0x0)
04:59:33 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0)
04:59:33 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:33 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:33 executing program 5:
sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x0)
bind$netlink(0xffffffffffffffff, 0x0, 0x0)
sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x9)
[ 382.272559][T16899] syz-executor.1: attempt to access beyond end of device
[ 382.272559][T16899] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:33 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, 0x0, 0x0)
04:59:33 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
socket$nl_audit(0x10, 0x3, 0x9)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
04:59:33 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
[ 382.323711][T16933] loop0: detected capacity change from 0 to 256
[ 382.326117][T16929] loop4: detected capacity change from 0 to 256
04:59:33 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, 0x0, 0x0)
04:59:33 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/104, 0x68)
04:59:33 executing program 5:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='.\x00', 0x1a484bc, &(0x7f0000000180)=ANY=[@ANYRES8, @ANYBLOB="eea73c3ca047349ab66d529fb1e2bdc61875c6ccebea30ba1b8977c632ddcbe0ed04f986b68ee600044bd75d3cfd10cc2ec88ccff020447cd9caded4abf65767e9dbbd7b5841a8ce3eb44c719a2e6c341bf68b2a0af04f1cc951b190c7fd36ffdbd0622cdc9b7c9a55b3f465def5740814395f095fc44a4cf6fe14b0d31f384214d59a0105d577557215473973f3b70178f49f0e48dbe138562f4d21cad59fafb7fbaf76461c56fdd2093329e2ece7cf96435bca11a90ba7f31e69c4b73ba3d172906ffc90f5de134a696a731d20a9cf70009a31f83d4b774b0d99de69f14db9cdbde38324513798bba5", @ANYRESDEC, @ANYRESDEC, @ANYRESOCT, @ANYRES16, @ANYRESHEX, @ANYBLOB="01e676f4fc1904efc297a3baa083d7d53048014c35429e763c6f76637cfd7d7491fe31362d2af6bcf176cfa249a2b36a99ee6b5542c22763a0688867eb2ac09c5078d612c0133ef8a8f40074a8e540e5b262ac889ea44bc2a2bf39dd3ddfd962da624b3b25a036d7e94664086a77f49d81cf9630794a2a15d9e3042b8e67e81dec650851a472e1d5c14d7ff4", @ANYRESHEX], 0x1, 0x0, &(0x7f0000000480))
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
sched_setscheduler(0x0, 0x0, 0x0)
ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000040)={0x0, 0x0, 0x1b, 0x8, 0x100, &(0x7f0000000440)="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"})
[ 382.411883][T16937] loop1: detected capacity change from 0 to 2048
[ 382.449961][T16949] loop0: detected capacity change from 0 to 256
[ 382.451974][ T27] audit: type=1400 audit(1699678773.225:394): avc: denied { remount } for pid=16944 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 382.475107][T16952] loop4: detected capacity change from 0 to 256
[ 382.533191][T16937] loop1: detected capacity change from 0 to 2048
[ 382.577232][T16937] loop1: detected capacity change from 0 to 2048
[ 382.659526][T16937] loop1: detected capacity change from 0 to 2048
[ 382.707451][T16937] loop1: detected capacity change from 0 to 2048
[ 382.777567][T16937] loop1: detected capacity change from 0 to 2048
[ 382.827855][T16937] loop1: detected capacity change from 0 to 2048
[ 382.890389][T16937] loop1: detected capacity change from 0 to 2048
[ 382.939057][T16937] loop1: detected capacity change from 0 to 2048
[ 382.986101][T16937] loop1: detected capacity change from 0 to 2048
[ 383.035705][T16937] loop1: detected capacity change from 0 to 2048
[ 383.054042][T16937] loop1: detected capacity change from 0 to 2048
[ 383.099039][T16937] loop1: detected capacity change from 0 to 2048
[ 383.148488][T16937] loop1: detected capacity change from 0 to 2048
04:59:33 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r7 = io_uring_setup(0x37db, &(0x7f0000000240))
r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8)
04:59:33 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
socket$nl_audit(0x10, 0x3, 0x9)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
04:59:33 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68)
04:59:33 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r0, &(0x7f0000000200), 0xf000)
write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:33 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, &(0x7f0000000000), 0x0)
04:59:33 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext, 0x81002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64)
getuid() (async, rerun: 64)
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[], 0x1, 0x541, &(0x7f0000000d40)="$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") (async)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async)
r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r0, &(0x7f0000000600)="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", 0x200) (async)
sendfile(r0, r1, 0x0, 0x7fffff67)
04:59:34 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, &(0x7f0000000000), 0x0)
04:59:34 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r7 = io_uring_setup(0x37db, &(0x7f0000000240))
r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8)
[ 383.228514][T16957] loop4: detected capacity change from 0 to 256
[ 383.229856][T16963] loop0: detected capacity change from 0 to 256
04:59:34 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68)
04:59:34 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, &(0x7f0000000000), 0x0)
04:59:34 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67)
04:59:34 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r0, &(0x7f0000000200), 0xf000)
write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:34 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, &(0x7f0000000000)=[{0x0}], 0x1)
04:59:34 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68)
[ 383.349315][T16978] loop4: detected capacity change from 0 to 256
[ 383.364935][T16985] loop1: detected capacity change from 0 to 2048
[ 383.371787][T16987] loop0: detected capacity change from 0 to 256
[ 383.444233][T16991] loop4: detected capacity change from 0 to 256
04:59:34 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, &(0x7f0000000000)=[{0x0}], 0x1)
04:59:34 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r7 = io_uring_setup(0x37db, &(0x7f0000000240))
r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8)
04:59:34 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
socket$nl_audit(0x10, 0x3, 0x9)
04:59:34 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
chdir(0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r0, &(0x7f0000000200), 0xf000)
write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:34 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, 0x0, 0x0)
04:59:34 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00')
readv(r0, &(0x7f0000000000)=[{0x0}], 0x1)
04:59:34 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:34 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r7 = io_uring_setup(0x37db, &(0x7f0000000240))
r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8)
[ 383.546205][T16997] loop0: detected capacity change from 0 to 256
[ 383.555579][T16998] loop4: detected capacity change from 0 to 256
[ 383.652418][T17011] loop0: detected capacity change from 0 to 256
04:59:34 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getuid() (async)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67) (async)
sendfile(r1, r2, 0x0, 0x7fffff67)
04:59:34 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_DFS_REGION={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0)
bind$netlink(r0, 0x0, 0x0)
sendmsg$netlink(r0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x0)
04:59:34 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:34 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, 0x0, 0x0)
04:59:34 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
io_uring_setup(0x37db, &(0x7f0000000240))
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, 0x0)
[ 383.814808][T16985] syz-executor.1: attempt to access beyond end of device
[ 383.814808][T16985] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
04:59:34 executing program 3:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0})
io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r6 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r7, r8, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r6, 0x0, 0x0})
io_uring_enter(r6, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
[ 383.860558][T17023] loop4: detected capacity change from 0 to 256
[ 383.926987][T17028] loop1: detected capacity change from 0 to 2048
[ 384.215524][T17033] syz-executor.1: attempt to access beyond end of device
[ 384.215524][T17033] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 384.229772][T17028] syz-executor.1: attempt to access beyond end of device
[ 384.229772][T17028] loop1: rw=34817, sector=2048, nr_sectors = 2 limit=2048
04:59:35 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
socket$nl_audit(0x10, 0x3, 0x9)
04:59:35 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
io_uring_setup(0x37db, &(0x7f0000000240))
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, 0x0)
04:59:35 executing program 4:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00')
rmdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
getdents64(r0, 0x0, 0x0)
04:59:35 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:35 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0)
bind$netlink(r0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
04:59:35 executing program 1:
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") (async)
r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async)
socket$inet6_tcp(0xa, 0x1, 0x0) (async)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffff67)
04:59:35 executing program 3:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', '.', [{0x20, 'nl80211\x00'}, {0x20, '.\xe4-+'}, {0x20, '\x91\''}, {0x20, 'wlan1\x00'}, {0x20, ':'}], 0xa, "6f75c087ea4e3e8614e75c2f9e11b536d5547f5aaa01966fe8872a5a"}, 0x3b)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='net_prio.prioidx\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0})
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="01e5ff000004000004003b1c210008000300", @ANYRES32=r2, @ANYBLOB="2c0433005000de295b3acba52ee4080211000001505050505050"], 0x448}}, 0x0)
openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r5 = socket$nl_generic(0x10, 0x3, 0x10)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r6, &(0x7f0000000240)=ANY=[], 0x3af4701e)
sendfile(r5, r4, 0x0, 0x10000a006)
04:59:35 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f00000006c0)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xca0, 0x8, 0x0, 0x1, [{0xa10, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x1d8, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x26}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x5c, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x238, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x44}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x548, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x10}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x8}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x258, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "80519ee09bcc7eca031f1842a075a5f26aeeb0be2f2e517f4a54fe410b37a029"}, @WGPEER_A_ALLOWEDIPS={0x220, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}]}]}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PEERS={0x20c, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_FLAGS={0x8}]}, {0x1f4, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "91a14b7f2ff70b40dd2c2d493b8d135e8d35fdc12a11fe95861754b5792b4c7e"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, @WGPEER_A_ALLOWEDIPS={0x194, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}]}]}]}]}, 0xec8}}, 0x0)
04:59:35 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
io_uring_setup(0x37db, &(0x7f0000000240))
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, 0x0)
[ 384.442333][T17038] loop4: detected capacity change from 0 to 256
04:59:35 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/")
r1 = getpid()
sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x3)
sched_setscheduler(r1, 0x3, &(0x7f0000000180)=0x800)
perf_event_open(&(0x7f0000000200)={0x193b7196c508fb12, 0x80, 0x81, 0xfc, 0x9, 0xa1, 0x0, 0x12, 0x21c88, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0x9}, 0x4000, 0x21, 0x7fff, 0x2, 0x5, 0x3, 0x891, 0x0, 0x200}, r1, 0x10, 0xffffffffffffffff, 0xa)
r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r2, &(0x7f0000000600)="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", 0x200)
sendfile(r2, r3, 0x0, 0x7fffff67)
04:59:35 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:35 executing program 4:
r0 = socket(0x2000000000000021, 0x2, 0x10000000000002)
sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0)
04:59:35 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r7)
04:59:35 executing program 4:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='net_prio.prioidx\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0})
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="a1e5ff0000040000040094a3210008000300", @ANYRES32=r2, @ANYBLOB="2c0433"], 0x448}}, 0x0)
preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r5 = socket$nl_generic(0x10, 0x3, 0x10)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r6, &(0x7f0000000240)=ANY=[], 0x3af4701e)
sendfile(r5, r4, 0x0, 0x10000a006)
04:59:35 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
socket$nl_audit(0x10, 0x3, 0x9)
[ 384.584435][T17059] loop1: detected capacity change from 0 to 2048
[ 384.611555][ T27] audit: type=1400 audit(1699678775.385:395): avc: denied { write } for pid=17066 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1
04:59:35 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r7)
04:59:35 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
r0 = openat(0xffffffffffffff9c, 0x0, 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:35 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r7)
[ 384.804823][T17087] loop0: detected capacity change from 0 to 256
04:59:35 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
r0 = openat(0xffffffffffffff9c, 0x0, 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:35 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
r7 = io_uring_setup(0x37db, &(0x7f0000000240))
r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8)
04:59:35 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
[ 384.947863][T17098] loop0: detected capacity change from 0 to 256
04:59:35 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getuid() (async)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
getpid() (async)
r1 = getpid()
sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x3)
sched_setscheduler(r1, 0x3, &(0x7f0000000180)=0x800) (async)
sched_setscheduler(r1, 0x3, &(0x7f0000000180)=0x800)
perf_event_open(&(0x7f0000000200)={0x193b7196c508fb12, 0x80, 0x81, 0xfc, 0x9, 0xa1, 0x0, 0x12, 0x21c88, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0x9}, 0x4000, 0x21, 0x7fff, 0x2, 0x5, 0x3, 0x891, 0x0, 0x200}, r1, 0x10, 0xffffffffffffffff, 0xa)
r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r2, r3, 0x0, 0x7fffff67)
04:59:35 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
04:59:35 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
r0 = openat(0xffffffffffffff9c, 0x0, 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:35 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
r7 = io_uring_setup(0x37db, &(0x7f0000000240))
r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8)
[ 385.076767][T17059] syz-executor.1: attempt to access beyond end of device
[ 385.076767][T17059] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 385.113488][T17107] loop0: detected capacity change from 0 to 256
[ 385.165109][T17111] loop1: detected capacity change from 0 to 2048
04:59:36 executing program 4:
r0 = socket$packet(0x11, 0x2, 0x300)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000001200)={'batadv0\x00', 0x0})
r2 = socket$packet(0x11, 0x2, 0x300)
sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x11, 0x806, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14)
04:59:36 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
04:59:36 executing program 3:
socket$nl_generic(0x10, 0x3, 0x10)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000003400), 0x4)
04:59:36 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:36 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0})
r7 = io_uring_setup(0x37db, &(0x7f0000000240))
r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8)
04:59:36 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001700)={&(0x7f00000006c0)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xca0, 0x8, 0x0, 0x1, [{0xa10, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x1d8, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x5c, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x238, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x548, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x258, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "80519ee09bcc7eca031f1842a075a5f26aeeb0be2f2e517f4a54fe410b37a029"}, @WGPEER_A_ALLOWEDIPS={0x220, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}]}]}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PEERS={0x20c, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_FLAGS={0x8}]}, {0x1f4, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "91a14b7f2ff70b40dd2c2d493b8d135e8d35fdc12a11fe95861754b5792b4c7e"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_ALLOWEDIPS={0x194, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}]}]}]}, 0xec8}}, 0x0)
04:59:36 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040), &(0x7f0000000100))
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r5 = io_uring_setup(0x37db, &(0x7f0000000240))
r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r6)
[ 385.328803][T17119] loop0: detected capacity change from 0 to 256
04:59:36 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
[ 385.448034][T17132] loop0: detected capacity change from 0 to 256
04:59:36 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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")
r1 = getpid()
sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x3)
sched_setscheduler(r1, 0x3, &(0x7f0000000180)=0x800)
perf_event_open(&(0x7f0000000200)={0x193b7196c508fb12, 0x80, 0x81, 0xfc, 0x9, 0xa1, 0x0, 0x12, 0x21c88, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0x9}, 0x4000, 0x21, 0x7fff, 0x2, 0x5, 0x3, 0x891, 0x0, 0x200}, r1, 0x10, 0xffffffffffffffff, 0xa) (async)
r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r2, &(0x7f0000000600)="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", 0x200) (async)
sendfile(r2, r3, 0x0, 0x7fffff67)
04:59:36 executing program 3:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6873d915e8f5bd56})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
04:59:36 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040), &(0x7f0000000100))
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r5 = io_uring_setup(0x37db, &(0x7f0000000240))
r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r6)
04:59:36 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000100)={0x10}, 0x10}], 0x1, &(0x7f0000001b00)=[@cred={{0x1c}}], 0x20}, 0x0)
04:59:36 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
socket$nl_audit(0x10, 0x3, 0x9)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
04:59:36 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:36 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x6)
bind$netlink(r0, &(0x7f0000001080)={0x10, 0x0, 0x0, 0x100000}, 0xc)
04:59:36 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@dellink={0x24, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x0)
04:59:36 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
[ 385.515273][T17111] syz-executor.1: attempt to access beyond end of device
[ 385.515273][T17111] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048
[ 385.551002][T17137] loop0: detected capacity change from 0 to 256
04:59:36 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040), &(0x7f0000000100))
io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r5 = io_uring_setup(0x37db, &(0x7f0000000240))
r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r6)
04:59:36 executing program 4:
syz_open_dev$vcsn(&(0x7f0000000140), 0x7, 0x511482)
04:59:36 executing program 3:
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x48)
[ 385.622591][T17152] loop0: detected capacity change from 0 to 256
[ 385.633230][T17145] loop1: detected capacity change from 0 to 2048
04:59:36 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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")
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:36 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0})
write$binfmt_elf32(r0, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x9, 0x8d, 0x6, 0x0, 0x3, 0x6, 0x200, 0x3c1, 0x38, 0x48, 0x3, 0x0, 0x20, 0x2, 0x8, 0x7fff, 0x8}, [{0x3, 0x4, 0x1, 0xffffffff, 0x3, 0xffffc32d, 0x3f, 0x589}], "a08f3983a5717437ef8d89fda8f800b72bdf858b14c8a8468178b5d1d4e015daf6fd9d59aaf57c42fc3207b1f5865173a7c50c32f0326a3b0e", ['\x00', '\x00', '\x00', '\x00']}, 0x491)
sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0)
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/tty/ldiscs\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000280)={'veth0_to_team\x00', 0x1000})
sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0xfffffffffffffec4, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfff}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x2a}, 0x1, 0x0, 0x0, 0x20000010}, 0x4804)
r5 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x90, 0x30, 0x1, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0xb}], [@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0)
getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000001400)=0x0, &(0x7f0000001440)=0x4)
ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001580)={'syztnl2\x00', &(0x7f0000001480)={'syztnl2\x00', r3, 0x7800, 0x40, 0x1, 0x0, {{0x37, 0x4, 0x1, 0x34, 0xdc, 0x67, 0x0, 0x3f, 0x29, 0x0, @private=0xa010100, @multicast2, {[@ssrr={0x89, 0x27, 0x51, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast, @remote, @rand_addr=0x64010102, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x38}]}, @end, @lsrr={0x83, 0x7, 0xdf, [@multicast2]}, @cipso={0x86, 0x1a, 0x3, [{0x1, 0x5, "f92977"}, {0x5, 0xf, "bddbb37d805a4fcdfe9316a415"}]}, @end, @timestamp_addr={0x44, 0x2c, 0xe0, 0x1, 0x4, [{@broadcast, 0x2}, {@loopback, 0x9}, {@remote, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@rand_addr=0x64010101, 0x9}]}, @ssrr={0x89, 0xb, 0x6c, [@empty, @rand_addr=0x64010102]}, @timestamp={0x44, 0xc, 0x40, 0x0, 0x4, [0x30000000, 0xcef]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x34, 0x94, 0x1, 0xf, [{@broadcast, 0x7}, {@loopback, 0xa6}, {@empty, 0x3}, {@multicast2, 0x8}, {@multicast2, 0x70e}, {@dev={0xac, 0x14, 0x14, 0x3f}}]}]}}}}})
ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f00000015c0)={'wg2\x00', 0x0})
getsockname$packet(r0, &(0x7f0000001600)={0x11, 0x0, 0x0}, &(0x7f0000001640)=0x14)
r10 = socket$nl_route(0x10, 0x3, 0x0)
r11 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r11, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0})
sendmsg$nl_route(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r12}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0)
sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000001ec0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001e80)={&(0x7f0000001680)={0x7c4, 0x0, 0x1, 0x70bd28, 0x25dfdbfc, {}, [{{0x8}, {0x220, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xec2}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ad74d3e}}}]}}, {{0x8, 0x1, r7}, {0x19c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x94}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xff}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r9}, {0x4}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r3}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x101, 0x18, 0x20, 0x7}, {0x9b2, 0x1, 0x40, 0xd3}, {0x8001, 0x1f, 0x1, 0x6}, {0x4, 0x6, 0x8, 0x4}, {0x3, 0xb4, 0x8, 0x6}, {0x0, 0x3, 0x3f, 0x401}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x69cb}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x7c4}, 0x1, 0x0, 0x0, 0x40}, 0x24000000)
write$binfmt_script(r5, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'msdos\x00'}, {0x20, 'veth0_to_team\x00'}, {0x20, '/\x94!'}, {0x20, '{*+\x1e}}%-'}, {0x20, 'veth0_to_team\x00'}, {0x20, 'msdos\x00'}, {0x20, '{'}, {0x20, '-^'}, {0x20, '[*'}, {0x20, '\xc7'}], 0xa, "e4ea1eb08692dfee169b7060cdc1f7f6eb"}, 0x5f)
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x1b33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x420, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r13 = getuid()
syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r13, @ANYRESHEX=r13, @ANYRES32=r13], 0x1, 0x53a, &(0x7f0000000800)="$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")
r14 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0)
r15 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r14, &(0x7f0000000600)="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", 0x200)
sendfile(r14, r15, 0x0, 0x7fffff67)
sendmsg$nl_xfrm(r14, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0x160}}, 0x80)
04:59:36 executing program 2:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81)
setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4)
sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0)
socket$nl_audit(0x10, 0x3, 0x9)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
04:59:36 executing program 4:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000001c0)="a3", 0x0}, 0x50)
04:59:36 executing program 3:
r0 = syz_open_procfs$userns(0x0, &(0x7f0000000280))
fcntl$getownex(r0, 0x407, 0x0)
04:59:36 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49})
io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100))
ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3])
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0})
io_uring_enter(0xffffffffffffffff, 0x2d3e, 0x0, 0x0, 0x0, 0x0)
r4 = io_uring_setup(0x37db, &(0x7f0000000240))
r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0x18, 0x20000000, r5)
04:59:36 executing program 0:
syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR")
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r1, &(0x7f0000000200), 0xf000)
write(r0, &(0x7f0000004200)='t', 0x1)
rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00')
04:59:36 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000100)=0x13, 0x4)
sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0)
[ 385.737224][T17163] loop0: detected capacity change from 0 to 256
04:59:36 executing program 3:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x508, 0x348, 0xc8, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x30}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568)
04:59:36 executing program 5:
r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=