NJECTION: forcing a failure. [ 346.836290][T15130] name failslab, interval 1, probability 0, space 0, times 0 [ 346.849099][T15130] CPU: 1 PID: 15130 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 346.859201][T15130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 346.869317][T15130] Call Trace: [ 346.872739][T15130] [ 346.875781][T15130] dump_stack_lvl+0xda/0x130 [ 346.880459][T15130] dump_stack+0x15/0x20 04:58:57 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async, rerun: 64) syz_clone3(&(0x7f0000000440)={0x8080000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0x1e}, &(0x7f0000000180)=""/218, 0xda, &(0x7f0000000280)=""/178, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0x0, 0x0], 0x4}, 0x58) (rerun: 64) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3, 0x69, 0x74, 0x9, 0x0, 0x10001, 0x80, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x6, 0x1}, 0x303, 0x80fc, 0x8000, 0x9, 0x20, 0x5e, 0x0, 0x0, 0x4, 0x0, 0xd}, r1, 0xa, r0, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 04:58:57 executing program 2: bpf$MAP_CREATE(0xa, &(0x7f0000000340), 0x48) 04:58:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000002500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000024c0)={&(0x7f0000002540)=ANY=[], 0x2380}}, 0x0) [ 346.884844][T15130] should_fail_ex+0x21f/0x230 [ 346.889594][T15130] ? iter_file_splice_write+0xeb/0x7e0 [ 346.895170][T15130] __should_failslab+0x92/0xa0 [ 346.900001][T15130] should_failslab+0x9/0x20 [ 346.904605][T15130] __kmem_cache_alloc_node+0x4e/0x210 [ 346.910100][T15130] ? splice_from_pipe+0xe0/0xe0 [ 346.915015][T15130] ? iter_file_splice_write+0xeb/0x7e0 [ 346.920603][T15130] __kmalloc+0x95/0x1a0 [ 346.924802][T15130] iter_file_splice_write+0xeb/0x7e0 [ 346.930147][T15130] ? splice_from_pipe+0xe0/0xe0 04:58:57 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040), 0x8) [ 346.935076][T15130] direct_splice_actor+0x8a/0xb0 [ 346.940215][T15130] splice_direct_to_actor+0x31d/0x690 [ 346.945668][T15130] ? direct_file_splice_eof+0x70/0x70 [ 346.951219][T15130] do_splice_direct+0x10d/0x190 [ 346.956245][T15130] ? do_splice_direct+0x190/0x190 [ 346.961332][T15130] do_sendfile+0x3c4/0x980 [ 346.965893][T15130] __x64_sys_sendfile64+0x110/0x150 [ 346.971255][T15130] do_syscall_64+0x44/0x110 [ 346.975799][T15130] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 346.981927][T15130] RIP: 0033:0x7f8517f84ae9 [ 346.986419][T15130] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 347.006247][T15130] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 347.014880][T15130] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 347.022884][T15130] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 04:58:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) (async) r1 = socket$kcm(0x2, 0x5, 0x0) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0x128, 0x30, 0x1, 0x0, 0x0, {}, [{0x114, 0x1, [@m_skbedit={0x110, 0x13, 0x0, 0x0, {{0xc}, {0x64, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x400, 0x7, 0x8, 0x8, 0x7}}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x5, 0xfffffd8b, 0x4, 0x9, 0x1}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x2, 0x7}}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0xfbe, 0x4, 0xffff, 0x4}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x9}]}, {0x83, 0x6, "8c6e2abcf3d8f37e92c8f33c2e94eb5dfe962548c12eb0d000c50ceb4295ee041c41b1676b7601bf6f6ea0c65bd84026d190402beb61f97d10e4e28b74f4994f410865c9be57cbf27b10d83912907479e7b57eb0db0bb3087223e802051cfbcc10a328f4a4cd826e9bb9865e0e2a240e662e17b2c9f0b90e750efed86897f0"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}]}, 0x128}}, 0x0) (async) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000240)=""/163, &(0x7f0000000000)=0xa3) (async) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4005, @local}, 0x10, 0x0}, 0x30004081) (async) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000500)=r0, 0x4) (async) close(r1) [ 347.030938][T15130] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 347.038946][T15130] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 347.046958][T15130] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 347.055066][T15130] 04:58:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 42) 04:58:57 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x2301) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x5, 0x1, 0x3}, 0x14}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000040)={0x0, 'veth0_vlan\x00', {0x3}, 0x5c}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001fc0), 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000000c0)={0xfeffffffffffff2e}) 04:58:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000d80)=@newtaction={0x44, 0x14, 0x2161, 0x0, 0x0, {0x2}, [{0x30, 0x1, [@m_ife={0x2c, 0x2, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x44}}, 0x0) 04:58:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000700)={'wg0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', r1}, 0x48) 04:58:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x8, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/145, 0x91}], 0x1, 0x0, 0x0) [ 347.083382][ T27] audit: type=1400 audit(1699678737.845:376): avc: denied { setopt } for pid=15157 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 04:58:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, 0x0) 04:58:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000007c0)=ANY=[@ANYBLOB="90"], 0x390}}, 0x0) [ 347.151130][T15174] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 347.212479][T15181] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15181 comm=syz-executor.3 [ 347.240622][T15182] loop1: detected capacity change from 0 to 2048 [ 347.267139][T15182] FAULT_INJECTION: forcing a failure. [ 347.267139][T15182] name failslab, interval 1, probability 0, space 0, times 0 [ 347.279948][T15182] CPU: 1 PID: 15182 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 347.290083][T15182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 347.305683][T15182] Call Trace: [ 347.309078][T15182] [ 347.312194][T15182] dump_stack_lvl+0xda/0x130 [ 347.316940][T15182] dump_stack+0x15/0x20 [ 347.321172][T15182] should_fail_ex+0x21f/0x230 [ 347.326184][T15182] ? __blockdev_direct_IO+0x137/0x1f90 [ 347.331736][T15182] __should_failslab+0x92/0xa0 [ 347.336665][T15182] should_failslab+0x9/0x20 [ 347.341316][T15182] kmem_cache_alloc+0x4e/0x250 [ 347.346394][T15182] __blockdev_direct_IO+0x137/0x1f90 [ 347.351759][T15182] ? __rcu_read_unlock+0x4d/0x70 [ 347.356742][T15182] ? find_get_entries+0x397/0x410 [ 347.361974][T15182] ? fat_block_truncate_page+0x40/0x40 [ 347.367524][T15182] ? invalidate_inode_pages2_range+0x6cc/0x720 [ 347.373837][T15182] fat_direct_IO+0x110/0x1d0 [ 347.378533][T15182] generic_file_direct_write+0xab/0x1f0 [ 347.384263][T15182] ? mnt_put_write_access_file+0x95/0xb0 [ 347.390041][T15182] __generic_file_write_iter+0xae/0x120 [ 347.395735][T15182] generic_file_write_iter+0x7d/0x1c0 [ 347.401296][T15182] do_iter_write+0x4ad/0x770 [ 347.405965][T15182] ? iter_file_splice_write+0xeb/0x7e0 [ 347.411529][T15182] vfs_iter_write+0x56/0x70 [ 347.416110][T15182] iter_file_splice_write+0x462/0x7e0 [ 347.421709][T15182] ? splice_from_pipe+0xe0/0xe0 [ 347.426628][T15182] direct_splice_actor+0x8a/0xb0 [ 347.431641][T15182] splice_direct_to_actor+0x31d/0x690 [ 347.437061][T15182] ? direct_file_splice_eof+0x70/0x70 [ 347.442574][T15182] do_splice_direct+0x10d/0x190 [ 347.447621][T15182] ? do_splice_direct+0x190/0x190 [ 347.452787][T15182] do_sendfile+0x3c4/0x980 [ 347.457252][T15182] __x64_sys_sendfile64+0x110/0x150 [ 347.462583][T15182] do_syscall_64+0x44/0x110 [ 347.467231][T15182] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 347.473294][T15182] RIP: 0033:0x7f8517f84ae9 [ 347.477730][T15182] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 347.497377][T15182] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 347.505878][T15182] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 04:58:58 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async) syz_clone3(&(0x7f0000000440)={0x8080000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0x1e}, &(0x7f0000000180)=""/218, 0xda, &(0x7f0000000280)=""/178, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0x0, 0x0], 0x4}, 0x58) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3, 0x69, 0x74, 0x9, 0x0, 0x10001, 0x80, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x6, 0x1}, 0x303, 0x80fc, 0x8000, 0x9, 0x20, 0x5e, 0x0, 0x0, 0x4, 0x0, 0xd}, r1, 0xa, r0, 0x8) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 04:58:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000480)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000263b3c"], 0x20}}, 0x0) 04:58:58 executing program 5: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x4}, 0x0, 0x0) 04:58:58 executing program 4: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40000000, &(0x7f0000000280), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000340)) 04:58:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9003000010"], 0x390}}, 0x0) 04:58:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 43) 04:58:58 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x6, 0x0, 0x0) 04:58:58 executing program 2: ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0x11105b87, 0x80000001, 0x5, 0x19a9, 0x1, 0xfff}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a80000001d0001"], 0xb8}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@empty, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}}, 0xb8}}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x40, &(0x7f0000000a00)=0x101, 0x4) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r1, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000004ac0)=""/102389, 0x18ff5}, {&(0x7f0000000a80)=""/244}], 0x1}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000bc0)=""/227}, {&(0x7f0000000340)=""/41}], 0x0, &(0x7f0000000d00)=""/154}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xc63b9e35) [ 347.513894][T15182] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 347.522178][T15182] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 347.530177][T15182] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 347.538230][T15182] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 347.546231][T15182] 04:58:58 executing program 3: bpf$MAP_CREATE(0x9, &(0x7f0000000340), 0x48) [ 347.586809][T15195] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.2'. 04:58:58 executing program 4: io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000000c80)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000200)="c1", 0x1}]) 04:58:58 executing program 3: memfd_create(&(0x7f0000000040)='|\x12\xb1[\xfd\x8as\xe7\xef\xb1b\x98\xe5\x1dw#\xa8\xa3\xc0a\xdbt\xa8\xb8\xe0n\xf6\x86H=\t\x05\xfdE\x17\xe56\xbc\x8b\xbc\xab\\P\xb8\xa0d\xad\x13\x0f?\b\xb1C\xef\xbb\x9bHu\xb0\xb4\xe3\xff\x00\x8d\xa2g\xb0\xb1\x84\xf4\xee\x12wDj\xf3\r\xf8=\x8bl\xb5\xc86\x06\x8d\r\xee\x00\xc0\n4\xad\xe7+\xe8Z\x144\x9cdgu\xfbF\x0e4\x00\xf8\xff\xff\xff\xff\xff\xff\xa1\x80\xd5\xc8\"Q\xa0\xfc(\x03\x86\x95\x94\xd4\xd9\x97}\xd8,i\xec}j\"\xb9\xd8*XV\x00\x16d?\xc3`\x93\x83\xfb<\xa0\xc0\n\x02\x9dh\xd5)9\xa3\xf0\xb6m\x92A\x17\xfe\x82\xb5{q\x82h5A\x9c\xa2\x12\x93\xe2Ty\xdf\xd5G\xef\x1e\xd07\xd4\xf0\xca\v\xcb\xec\x81\xf8\xb2\"L\xad\x8f\x03U(R\xef\xe4\xab\x9am\xef\xec\x8f\xfd\xbaq\xfd\x80\x05\x8d{\xf7\x15\x86\x10\xa0i\xac\xcc5U\xbd6\xf8\xearx\xc8\x9c\xa7\xb4g3\\\xf1\xaavy\xf7Lt\xdfGqQy\x8dAi\xc6\xccH\x02\x7f\n\x80\xb3r', 0x0) [ 347.651258][T15200] loop1: detected capacity change from 0 to 2048 04:58:58 executing program 3: syz_clone(0x60800000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 04:58:58 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r2}}, './file0\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r6, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_addrs=@l2={0x1f, 0x0, @fixed}}) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x50, 0x0, 0x800, 0x70bd27, 0x25dfdff9, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4a}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x50}}, 0x20046004) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r7, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), r5) sendmsg$NFT_BATCH(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x40000000, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0xb, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x74}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_COALESCE(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r10, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYRESDEC=r8, @ANYRES16=r8, @ANYBLOB="040028530f00fbdbdf253c0200000800010050006784b84f4dc601041a10d00359795937286b2b0cd5a6d621e21c63810000000000000040004f0000009fb1058f45693499f96b65747bba6b29e8307e5b1bbfe883b52afb8a640d0ca7554cc9617f60e6dacc3cf5573855d9f1eb451c6bb0af9eab99c1526346f9116f06f43cff846f28a7608802e9cdebe47e3f92435d91913644320d1ad3a1f71b7419d6a7fca112e207f6f1d9abb183e6c433f80a801b"], 0x28}, 0x1, 0x0, 0x0, 0x4000010}, 0xc854) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_COALESCE(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB="020e5dd5", @ANYRES16=r12, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r13, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="d48487428266ba76df251300000008000300face0aaf55e19a0a2626", @ANYRES32=r13, @ANYRES64], 0x24}, 0x1, 0x0, 0x0, 0x4041}, 0x40090) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r5, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x7c, r8, 0x100, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_IE={0x20, 0x2a, [@channel_switch={0x25, 0x3, {0x0, 0x64, 0x9}}, @erp={0x2a, 0x1, {0x1, 0x0, 0x1}}, @link_id={0x65, 0x12, {@initial, @broadcast, @device_b}}]}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x1f}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x80000001}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x27}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x2}, @NL80211_ATTR_TDLS_INITIATOR={0x4}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x4040001) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x2c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x298}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x8004) sendmsg$NL80211_CMD_SET_WOWLAN(r3, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x340, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x30c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xd8, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x81, 0x8001, 0x10001}}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0xb9, 0x8, {0x4, 0xffffffc1, "71dc911002cbf6e57e0187b4bb11fcd21ad95804a5d3399ab3c0d7a035331dcbbf01f7554bfeda907c416e5bf3de937a4b124299e65e26351dc1968788c72cb936f19cd1bd2a0c3af3b8889a0436fea97fee86b54f518028a2e98ff35b02619b342bbea856c4c8e7d1ac6ab22def6de61cae567abedacedf5b67e97597603346fa4a2140769c742f03e1080407bcad5e83131d7c374acc6172204b002f6ffd14db1beccfbd37f1b5d7dad2bc0d"}}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x800}]}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x230, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_SSIDS={0x30, 0x2d, 0x0, 0x1, [{0xb, 0x0, @random="db6d4eda8e7cee"}, {0xa, 0x0, @default_ibss_ssid}, {0x6, 0x0, @random="ceed"}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1f4, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x13, 0x2, "6367dbe65dc668edcddcf2e14263e2"}, @NL80211_BAND_5GHZ={0x8f, 0x1, "6b5ea56e8ec48ebe4d60a189af5bef5b9dd514dc655936f7fa49287e941839ecc1e703075a7b2840ca50c1d72c191162118179ed4d1887980fb69918b105604fed6368ae815b659f1d5dfa641179e3e8488f303d431b5785bfebd1cdaf5e5c14eb9b331c2c2269499f8107a9421437bfffb26ab92c71485a41b3fba2366de8d122036bb084cae628b39073"}, @NL80211_BAND_6GHZ={0x22, 0x3, "6806b3eddc8938199c60c9f9e7c2f843b06db534c3061422345b82527cea"}, @NL80211_BAND_5GHZ={0xc3, 0x1, "0d2c580e2a8d8024544ca39b776cb02e65878731c2581d3103af4764d55bd3a4342f2f81ff25693668f4daa57484d3b016d42b26604415f682c46a5f1517c785267fc50a2e74e825c77e87d99f23aa2e670c0e26c7fffb82a7337d8b2bc1280b233f9aebb2e2aec4642980d1ed72a9c2c16b8576d789a3226ad2399b5b5bcd67e1de49c59ae42cd59694a4b5a539d5fea17956c224291ac9cef2adf9ab493e5cc8e1366cfbcda0446d499059242140400f113d04c0728588c15b2e2fc5f438"}, @NL80211_BAND_6GHZ={0x64, 0x3, "58a7de7631037f00a9bf052a4cd8d6832156951501631c34460496e3f01c457526fbd92bf314b10f04d77017e8c32bd225facd30e56c773237230485442eb60bc34edd55dd866d47cd61df84d61329ba953fae14c232bf4acde66f093466e299"}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x6}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x18, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}]}, 0x340}, 0x1, 0x0, 0x0, 0x40000}, 0x20008040) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r15, &(0x7f0000000000), 0xfdef) [ 347.747299][T15212] bridge_slave_1: left allmulticast mode [ 347.753014][T15212] bridge_slave_1: left promiscuous mode [ 347.758777][T15212] bridge0: port 2(bridge_slave_1) entered disabled state 04:58:58 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x60800000, &(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) [ 347.787687][T15212] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 348.121235][T15200] syz-executor.1: attempt to access beyond end of device [ 348.121235][T15200] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:58:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}]}, 0x34}}, 0x0) 04:58:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 44) 04:58:59 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x0) 04:58:59 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r2}}, './file0\x00'}) (async, rerun: 64) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) (async, rerun: 32) r6 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) ioctl$sock_ifreq(r6, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_addrs=@l2={0x1f, 0x0, @fixed}}) (async, rerun: 64) r7 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x50, 0x0, 0x800, 0x70bd27, 0x25dfdff9, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4a}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x50}}, 0x20046004) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) (async) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r7, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), r5) (async, rerun: 64) sendmsg$NFT_BATCH(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x40000000, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0xb, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x74}}, 0x0) (async, rerun: 64) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_COALESCE(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r10, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0) (async, rerun: 32) sendmsg$NL80211_CMD_REGISTER_BEACONS(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYRESDEC=r8, @ANYRES16=r8, @ANYBLOB="040028530f00fbdbdf253c0200000800010050006784b84f4dc601041a10d00359795937286b2b0cd5a6d621e21c63810000000000000040004f0000009fb1058f45693499f96b65747bba6b29e8307e5b1bbfe883b52afb8a640d0ca7554cc9617f60e6dacc3cf5573855d9f1eb451c6bb0af9eab99c1526346f9116f06f43cff846f28a7608802e9cdebe47e3f92435d91913644320d1ad3a1f71b7419d6a7fca112e207f6f1d9abb183e6c433f80a801b"], 0x28}, 0x1, 0x0, 0x0, 0x4000010}, 0xc854) (async, rerun: 32) r11 = socket$nl_generic(0x10, 0x3, 0x10) (async) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_COALESCE(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB="020e5dd5", @ANYRES16=r12, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r13, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="d48487428266ba76df251300000008000300face0aaf55e19a0a2626", @ANYRES32=r13, @ANYRES64], 0x24}, 0x1, 0x0, 0x0, 0x4041}, 0x40090) (async) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r5, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x7c, r8, 0x100, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_IE={0x20, 0x2a, [@channel_switch={0x25, 0x3, {0x0, 0x64, 0x9}}, @erp={0x2a, 0x1, {0x1, 0x0, 0x1}}, @link_id={0x65, 0x12, {@initial, @broadcast, @device_b}}]}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x1f}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x80000001}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x27}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x2}, @NL80211_ATTR_TDLS_INITIATOR={0x4}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x4040001) (async) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x2c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x298}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x8004) (async) sendmsg$NL80211_CMD_SET_WOWLAN(r3, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x340, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x30c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xd8, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x81, 0x8001, 0x10001}}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0xb9, 0x8, {0x4, 0xffffffc1, "71dc911002cbf6e57e0187b4bb11fcd21ad95804a5d3399ab3c0d7a035331dcbbf01f7554bfeda907c416e5bf3de937a4b124299e65e26351dc1968788c72cb936f19cd1bd2a0c3af3b8889a0436fea97fee86b54f518028a2e98ff35b02619b342bbea856c4c8e7d1ac6ab22def6de61cae567abedacedf5b67e97597603346fa4a2140769c742f03e1080407bcad5e83131d7c374acc6172204b002f6ffd14db1beccfbd37f1b5d7dad2bc0d"}}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x800}]}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x230, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_SSIDS={0x30, 0x2d, 0x0, 0x1, [{0xb, 0x0, @random="db6d4eda8e7cee"}, {0xa, 0x0, @default_ibss_ssid}, {0x6, 0x0, @random="ceed"}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1f4, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x13, 0x2, "6367dbe65dc668edcddcf2e14263e2"}, @NL80211_BAND_5GHZ={0x8f, 0x1, "6b5ea56e8ec48ebe4d60a189af5bef5b9dd514dc655936f7fa49287e941839ecc1e703075a7b2840ca50c1d72c191162118179ed4d1887980fb69918b105604fed6368ae815b659f1d5dfa641179e3e8488f303d431b5785bfebd1cdaf5e5c14eb9b331c2c2269499f8107a9421437bfffb26ab92c71485a41b3fba2366de8d122036bb084cae628b39073"}, @NL80211_BAND_6GHZ={0x22, 0x3, "6806b3eddc8938199c60c9f9e7c2f843b06db534c3061422345b82527cea"}, @NL80211_BAND_5GHZ={0xc3, 0x1, "0d2c580e2a8d8024544ca39b776cb02e65878731c2581d3103af4764d55bd3a4342f2f81ff25693668f4daa57484d3b016d42b26604415f682c46a5f1517c785267fc50a2e74e825c77e87d99f23aa2e670c0e26c7fffb82a7337d8b2bc1280b233f9aebb2e2aec4642980d1ed72a9c2c16b8576d789a3226ad2399b5b5bcd67e1de49c59ae42cd59694a4b5a539d5fea17956c224291ac9cef2adf9ab493e5cc8e1366cfbcda0446d499059242140400f113d04c0728588c15b2e2fc5f438"}, @NL80211_BAND_6GHZ={0x64, 0x3, "58a7de7631037f00a9bf052a4cd8d6832156951501631c34460496e3f01c457526fbd92bf314b10f04d77017e8c32bd225facd30e56c773237230485442eb60bc34edd55dd866d47cd61df84d61329ba953fae14c232bf4acde66f093466e299"}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x6}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x18, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}]}, 0x340}, 0x1, 0x0, 0x0, 0x40000}, 0x20008040) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r15, &(0x7f0000000000), 0xfdef) 04:58:59 executing program 5: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x108, 0x1c0, 0x0, 0xffffffff, 0xffffffff, 0x2a0, 0x2a0, 0x2a0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, 0x0, 0x0, 'ip_vti0\x00', 'wlan1\x00'}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'nicvf0\x00', 'nicvf0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f4b1b9452f88b6c754854ece3e68d81380b64ecdf48ec04dfadfc01ddbf8"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)) 04:58:59 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5452, &(0x7f0000000000)={'vxcan1\x00'}) 04:58:59 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r2}}, './file0\x00'}) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r6, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_addrs=@l2={0x1f, 0x0, @fixed}}) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x50, 0x0, 0x800, 0x70bd27, 0x25dfdff9, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4a}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x50}}, 0x20046004) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) (async) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) (async) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r7, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), r5) sendmsg$NFT_BATCH(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x40000000, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0xb, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x74}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_COALESCE(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r10, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0) (async) sendmsg$NL80211_CMD_REGISTER_BEACONS(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYRESDEC=r8, @ANYRES16=r8, @ANYBLOB="040028530f00fbdbdf253c0200000800010050006784b84f4dc601041a10d00359795937286b2b0cd5a6d621e21c63810000000000000040004f0000009fb1058f45693499f96b65747bba6b29e8307e5b1bbfe883b52afb8a640d0ca7554cc9617f60e6dacc3cf5573855d9f1eb451c6bb0af9eab99c1526346f9116f06f43cff846f28a7608802e9cdebe47e3f92435d91913644320d1ad3a1f71b7419d6a7fca112e207f6f1d9abb183e6c433f80a801b"], 0x28}, 0x1, 0x0, 0x0, 0x4000010}, 0xc854) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_COALESCE(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB="020e5dd5", @ANYRES16=r12, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r13, @ANYBLOB="0c0099000000006ef81e61000800020000000000"], 0x30}}, 0x0) (async) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="d48487428266ba76df251300000008000300face0aaf55e19a0a2626", @ANYRES32=r13, @ANYRES64], 0x24}, 0x1, 0x0, 0x0, 0x4041}, 0x40090) (async) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r5, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x7c, r8, 0x100, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_IE={0x20, 0x2a, [@channel_switch={0x25, 0x3, {0x0, 0x64, 0x9}}, @erp={0x2a, 0x1, {0x1, 0x0, 0x1}}, @link_id={0x65, 0x12, {@initial, @broadcast, @device_b}}]}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x1f}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x80000001}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x27}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x2}, @NL80211_ATTR_TDLS_INITIATOR={0x4}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x4040001) (async) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x2c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x298}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x8004) (async) sendmsg$NL80211_CMD_SET_WOWLAN(r3, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x340, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x30c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xd8, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x81, 0x8001, 0x10001}}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0xb9, 0x8, {0x4, 0xffffffc1, "71dc911002cbf6e57e0187b4bb11fcd21ad95804a5d3399ab3c0d7a035331dcbbf01f7554bfeda907c416e5bf3de937a4b124299e65e26351dc1968788c72cb936f19cd1bd2a0c3af3b8889a0436fea97fee86b54f518028a2e98ff35b02619b342bbea856c4c8e7d1ac6ab22def6de61cae567abedacedf5b67e97597603346fa4a2140769c742f03e1080407bcad5e83131d7c374acc6172204b002f6ffd14db1beccfbd37f1b5d7dad2bc0d"}}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x800}]}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x230, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_SSIDS={0x30, 0x2d, 0x0, 0x1, [{0xb, 0x0, @random="db6d4eda8e7cee"}, {0xa, 0x0, @default_ibss_ssid}, {0x6, 0x0, @random="ceed"}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1f4, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x13, 0x2, "6367dbe65dc668edcddcf2e14263e2"}, @NL80211_BAND_5GHZ={0x8f, 0x1, "6b5ea56e8ec48ebe4d60a189af5bef5b9dd514dc655936f7fa49287e941839ecc1e703075a7b2840ca50c1d72c191162118179ed4d1887980fb69918b105604fed6368ae815b659f1d5dfa641179e3e8488f303d431b5785bfebd1cdaf5e5c14eb9b331c2c2269499f8107a9421437bfffb26ab92c71485a41b3fba2366de8d122036bb084cae628b39073"}, @NL80211_BAND_6GHZ={0x22, 0x3, "6806b3eddc8938199c60c9f9e7c2f843b06db534c3061422345b82527cea"}, @NL80211_BAND_5GHZ={0xc3, 0x1, "0d2c580e2a8d8024544ca39b776cb02e65878731c2581d3103af4764d55bd3a4342f2f81ff25693668f4daa57484d3b016d42b26604415f682c46a5f1517c785267fc50a2e74e825c77e87d99f23aa2e670c0e26c7fffb82a7337d8b2bc1280b233f9aebb2e2aec4642980d1ed72a9c2c16b8576d789a3226ad2399b5b5bcd67e1de49c59ae42cd59694a4b5a539d5fea17956c224291ac9cef2adf9ab493e5cc8e1366cfbcda0446d499059242140400f113d04c0728588c15b2e2fc5f438"}, @NL80211_BAND_6GHZ={0x64, 0x3, "58a7de7631037f00a9bf052a4cd8d6832156951501631c34460496e3f01c457526fbd92bf314b10f04d77017e8c32bd225facd30e56c773237230485442eb60bc34edd55dd866d47cd61df84d61329ba953fae14c232bf4acde66f093466e299"}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x6}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x18, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}]}, 0x340}, 0x1, 0x0, 0x0, 0x40000}, 0x20008040) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r15, &(0x7f0000000000), 0xfdef) [ 348.474248][T15228] loop1: detected capacity change from 0 to 2048 04:58:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x0, 0x40, 0x2}, 0x48) 04:58:59 executing program 3: pipe(&(0x7f0000000500)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000100)) 04:58:59 executing program 5: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x401c5820, &(0x7f0000000600)) 04:58:59 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000440)={0x0, 0x7, 0x0, [0x101, 0x0, 0x5, 0xc85, 0x8], [0x1000, 0x0, 0x1, 0x7, 0x5, 0xffffffffffffffff, 0x1, 0x2, 0x3, 0x3, 0x0, 0xffff, 0x6, 0x200, 0xfffffffffffffff7, 0x3, 0x200, 0x6, 0x1b4, 0x8, 0x4f9c, 0x8000, 0x9a, 0x200, 0x6, 0x2b9a, 0x1c1, 0x5, 0x1200000000000000, 0x1ff, 0x2, 0xfffffffffffffe00, 0x8, 0x10000, 0x7f, 0x3, 0x80, 0x7, 0x84, 0xffffffffffffff9e, 0x4, 0xbeae, 0x7, 0x7, 0x6, 0x7dd, 0x7ff, 0x80000000, 0xa8, 0x1f, 0x4380, 0x0, 0x81, 0x9, 0xc1, 0x1, 0x100, 0xffffffffffffff6d, 0xc4, 0xc18a, 0x3, 0x4, 0x200, 0x80, 0x8015, 0x7, 0x4, 0xbebd, 0x4, 0x458, 0x5, 0x1, 0x0, 0x8, 0x6, 0x0, 0x80000000, 0x5, 0x7, 0x5, 0x89, 0x4, 0x100, 0x8, 0xa791, 0xfff, 0x4, 0x50b8, 0x400, 0xffffffffffffcec0, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x8, 0x10001, 0x5, 0xfffffffffffff801, 0x8, 0x6, 0x5, 0x100000000, 0xff0, 0x5, 0x9, 0x4, 0x96b, 0xfffffffffffffffe, 0x0, 0x1d50, 0x5, 0x9, 0x7a, 0x4d9b, 0x8, 0x0, 0x7ff, 0x0, 0x9, 0x6312]}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000880)={r3, 0xbc5, 0x0, [0x2, 0x1, 0x80000001, 0x9, 0x6], [0x800, 0x0, 0xfffffffffffffff7, 0x8, 0xffd1, 0x81, 0x8000, 0x0, 0x7fffffff, 0xf8b, 0x5, 0x7, 0x10000, 0x6, 0x80000001, 0x2, 0x6, 0x3, 0x63, 0x3, 0x100, 0x200000000000000, 0x3, 0x7, 0x81, 0x4, 0x0, 0x8, 0xfffffffeffffffff, 0x3, 0xff, 0xe000000000, 0x3, 0x3c, 0x3, 0x8000000000000000, 0x8001, 0x3, 0x460, 0xfffffffffffffffa, 0x20, 0xe1c4, 0x2, 0xc04, 0x4, 0xfff, 0x8001, 0x2, 0x7, 0x1, 0x1, 0xc65, 0x80, 0x3c78, 0x7ff, 0x8000000000000001, 0x59, 0x5749, 0x5, 0x9, 0x7, 0x1ca1, 0x4, 0x4, 0x5, 0x9, 0x100000001, 0x7f, 0xa3e1, 0x6, 0x9f8, 0xfff, 0x7f, 0x9, 0x9, 0xe18b, 0x80dc, 0x5, 0x1, 0x5, 0x1, 0xfffffffffffff747, 0x4, 0x5, 0x1, 0xf85e, 0xffffffffffffffff, 0xfffffffffffffb7a, 0x9, 0x2, 0x624fadc2, 0x100000000, 0x9e1, 0x1, 0x2, 0x9, 0x2f90, 0x0, 0x87, 0x4, 0x8, 0x4, 0x3, 0xfffffffffffffffa, 0x7, 0x80000000, 0x9e7, 0x1f, 0x0, 0x3, 0x3ff, 0x9, 0x0, 0x31fca8d1, 0x7fff, 0x100000001, 0xff, 0xffffffffbfa4a976, 0x7, 0x6]}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 04:58:59 executing program 4: mmap$xdp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x40030, 0xffffffffffffffff, 0x0) 04:58:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 04:58:59 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000001500)='ns/cgroup\x00') [ 348.645748][ T27] audit: type=1400 audit(1699678739.415:377): avc: denied { execute } for pid=15251 comm="syz-executor.4" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=43549 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 348.649535][T15255] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15255 comm=syz-executor.3 04:58:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 45) 04:58:59 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000440)={0x0, 0x7, 0x0, [0x101, 0x0, 0x5, 0xc85, 0x8], [0x1000, 0x0, 0x1, 0x7, 0x5, 0xffffffffffffffff, 0x1, 0x2, 0x3, 0x3, 0x0, 0xffff, 0x6, 0x200, 0xfffffffffffffff7, 0x3, 0x200, 0x6, 0x1b4, 0x8, 0x4f9c, 0x8000, 0x9a, 0x200, 0x6, 0x2b9a, 0x1c1, 0x5, 0x1200000000000000, 0x1ff, 0x2, 0xfffffffffffffe00, 0x8, 0x10000, 0x7f, 0x3, 0x80, 0x7, 0x84, 0xffffffffffffff9e, 0x4, 0xbeae, 0x7, 0x7, 0x6, 0x7dd, 0x7ff, 0x80000000, 0xa8, 0x1f, 0x4380, 0x0, 0x81, 0x9, 0xc1, 0x1, 0x100, 0xffffffffffffff6d, 0xc4, 0xc18a, 0x3, 0x4, 0x200, 0x80, 0x8015, 0x7, 0x4, 0xbebd, 0x4, 0x458, 0x5, 0x1, 0x0, 0x8, 0x6, 0x0, 0x80000000, 0x5, 0x7, 0x5, 0x89, 0x4, 0x100, 0x8, 0xa791, 0xfff, 0x4, 0x50b8, 0x400, 0xffffffffffffcec0, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x8, 0x10001, 0x5, 0xfffffffffffff801, 0x8, 0x6, 0x5, 0x100000000, 0xff0, 0x5, 0x9, 0x4, 0x96b, 0xfffffffffffffffe, 0x0, 0x1d50, 0x5, 0x9, 0x7a, 0x4d9b, 0x8, 0x0, 0x7ff, 0x0, 0x9, 0x6312]}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000880)={r3, 0xbc5, 0x0, [0x2, 0x1, 0x80000001, 0x9, 0x6], [0x800, 0x0, 0xfffffffffffffff7, 0x8, 0xffd1, 0x81, 0x8000, 0x0, 0x7fffffff, 0xf8b, 0x5, 0x7, 0x10000, 0x6, 0x80000001, 0x2, 0x6, 0x3, 0x63, 0x3, 0x100, 0x200000000000000, 0x3, 0x7, 0x81, 0x4, 0x0, 0x8, 0xfffffffeffffffff, 0x3, 0xff, 0xe000000000, 0x3, 0x3c, 0x3, 0x8000000000000000, 0x8001, 0x3, 0x460, 0xfffffffffffffffa, 0x20, 0xe1c4, 0x2, 0xc04, 0x4, 0xfff, 0x8001, 0x2, 0x7, 0x1, 0x1, 0xc65, 0x80, 0x3c78, 0x7ff, 0x8000000000000001, 0x59, 0x5749, 0x5, 0x9, 0x7, 0x1ca1, 0x4, 0x4, 0x5, 0x9, 0x100000001, 0x7f, 0xa3e1, 0x6, 0x9f8, 0xfff, 0x7f, 0x9, 0x9, 0xe18b, 0x80dc, 0x5, 0x1, 0x5, 0x1, 0xfffffffffffff747, 0x4, 0x5, 0x1, 0xf85e, 0xffffffffffffffff, 0xfffffffffffffb7a, 0x9, 0x2, 0x624fadc2, 0x100000000, 0x9e1, 0x1, 0x2, 0x9, 0x2f90, 0x0, 0x87, 0x4, 0x8, 0x4, 0x3, 0xfffffffffffffffa, 0x7, 0x80000000, 0x9e7, 0x1f, 0x0, 0x3, 0x3ff, 0x9, 0x0, 0x31fca8d1, 0x7fff, 0x100000001, 0xff, 0xffffffffbfa4a976, 0x7, 0x6]}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 04:58:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)="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", 0x7f8}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000010c0)=[{0x0}, {&(0x7f0000000dc0)="459f6f543dc3b0fd1e401ba0c714ca3e4dfbd2f0170ee86a2f7d6ba02650d255614a9ccae7a7bdcd2ed09b87774184934094e2d4324df8b512eebbf4cc0784c47dae888f0bff689b25c5778183daae2c2e3b5fa3eef32386f4c0f2e6ed8f460a46036e5255358e8ae00b8680c1679a44af6b4fba977cac89d7b141d9b3d8ae", 0x7f}], 0x2}}], 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:58:59 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8912, &(0x7f0000000000)={'vxcan1\x00'}) 04:58:59 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000600)) 04:58:59 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 04:58:59 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r0) [ 348.872924][T15228] syz-executor.1: attempt to access beyond end of device [ 348.872924][T15228] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:58:59 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 04:58:59 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000440)={0x0, 0x7, 0x0, [0x101, 0x0, 0x5, 0xc85, 0x8], [0x1000, 0x0, 0x1, 0x7, 0x5, 0xffffffffffffffff, 0x1, 0x2, 0x3, 0x3, 0x0, 0xffff, 0x6, 0x200, 0xfffffffffffffff7, 0x3, 0x200, 0x6, 0x1b4, 0x8, 0x4f9c, 0x8000, 0x9a, 0x200, 0x6, 0x2b9a, 0x1c1, 0x5, 0x1200000000000000, 0x1ff, 0x2, 0xfffffffffffffe00, 0x8, 0x10000, 0x7f, 0x3, 0x80, 0x7, 0x84, 0xffffffffffffff9e, 0x4, 0xbeae, 0x7, 0x7, 0x6, 0x7dd, 0x7ff, 0x80000000, 0xa8, 0x1f, 0x4380, 0x0, 0x81, 0x9, 0xc1, 0x1, 0x100, 0xffffffffffffff6d, 0xc4, 0xc18a, 0x3, 0x4, 0x200, 0x80, 0x8015, 0x7, 0x4, 0xbebd, 0x4, 0x458, 0x5, 0x1, 0x0, 0x8, 0x6, 0x0, 0x80000000, 0x5, 0x7, 0x5, 0x89, 0x4, 0x100, 0x8, 0xa791, 0xfff, 0x4, 0x50b8, 0x400, 0xffffffffffffcec0, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x8, 0x10001, 0x5, 0xfffffffffffff801, 0x8, 0x6, 0x5, 0x100000000, 0xff0, 0x5, 0x9, 0x4, 0x96b, 0xfffffffffffffffe, 0x0, 0x1d50, 0x5, 0x9, 0x7a, 0x4d9b, 0x8, 0x0, 0x7ff, 0x0, 0x9, 0x6312]}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000880)={r3, 0xbc5, 0x0, [0x2, 0x1, 0x80000001, 0x9, 0x6], [0x800, 0x0, 0xfffffffffffffff7, 0x8, 0xffd1, 0x81, 0x8000, 0x0, 0x7fffffff, 0xf8b, 0x5, 0x7, 0x10000, 0x6, 0x80000001, 0x2, 0x6, 0x3, 0x63, 0x3, 0x100, 0x200000000000000, 0x3, 0x7, 0x81, 0x4, 0x0, 0x8, 0xfffffffeffffffff, 0x3, 0xff, 0xe000000000, 0x3, 0x3c, 0x3, 0x8000000000000000, 0x8001, 0x3, 0x460, 0xfffffffffffffffa, 0x20, 0xe1c4, 0x2, 0xc04, 0x4, 0xfff, 0x8001, 0x2, 0x7, 0x1, 0x1, 0xc65, 0x80, 0x3c78, 0x7ff, 0x8000000000000001, 0x59, 0x5749, 0x5, 0x9, 0x7, 0x1ca1, 0x4, 0x4, 0x5, 0x9, 0x100000001, 0x7f, 0xa3e1, 0x6, 0x9f8, 0xfff, 0x7f, 0x9, 0x9, 0xe18b, 0x80dc, 0x5, 0x1, 0x5, 0x1, 0xfffffffffffff747, 0x4, 0x5, 0x1, 0xf85e, 0xffffffffffffffff, 0xfffffffffffffb7a, 0x9, 0x2, 0x624fadc2, 0x100000000, 0x9e1, 0x1, 0x2, 0x9, 0x2f90, 0x0, 0x87, 0x4, 0x8, 0x4, 0x3, 0xfffffffffffffffa, 0x7, 0x80000000, 0x9e7, 0x1f, 0x0, 0x3, 0x3ff, 0x9, 0x0, 0x31fca8d1, 0x7fff, 0x100000001, 0xff, 0xffffffffbfa4a976, 0x7, 0x6]}) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 04:58:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x48) 04:58:59 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x26) 04:58:59 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x90, 0x30, 0x1, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0xb}], [@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) close(r0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='*[:)\'*%*#_\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) [ 348.979723][T15272] loop1: detected capacity change from 0 to 2048 04:59:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 46) 04:59:00 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000600)) [ 349.295817][T15272] syz-executor.1: attempt to access beyond end of device [ 349.295817][T15272] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 349.351191][T15289] loop1: detected capacity change from 0 to 2048 [ 349.599979][T15289] syz-executor.1: attempt to access beyond end of device [ 349.599979][T15289] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:00 executing program 5: socketpair(0x18, 0x0, 0x2, &(0x7f0000000880)) 04:59:00 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async, rerun: 32) r0 = socket$nl_route(0x10, 0x3, 0x0) (rerun: 32) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x90, 0x30, 0x1, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0xb}], [@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) (async) close(r0) (async) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='*[:)\'*%*#_\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) (async, rerun: 32) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (rerun: 32) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 04:59:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$binfmt_script(r0, &(0x7f0000000600)={'#! ', './file0'}, 0xb) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 04:59:00 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x401c5820, &(0x7f0000000000)={'vxcan1\x00'}) 04:59:00 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000340)) 04:59:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 47) 04:59:00 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x90, 0x30, 0x1, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0xb}], [@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) (async) close(r0) (async) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='*[:)\'*%*#_\x00') (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 04:59:00 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000006c0)='ext4_es_remove_extent\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socket(0x3, 0x3, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 04:59:00 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'veth0_virt_wifi\x00', 0x2}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, 0x0) 04:59:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@gettaction={0x28, 0x32, 0x1, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x28}}, 0x0) 04:59:00 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) ppoll(&(0x7f00000000c0)=[{r2, 0x80d0}, {r0, 0x100}, {r4, 0x304}, {r5, 0x11b}, {r0, 0x40}], 0x5, &(0x7f0000000100), &(0x7f0000000140)={[0x7]}, 0x8) getpeername$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) 04:59:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x1a, &(0x7f0000000540)={&(0x7f0000000340)={0xfffffffffffffd93, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x18}}, 0x0) 04:59:00 executing program 4: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x1}, &(0x7f0000000100)={0x0, 0x3938700}, 0x0) 04:59:00 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) [ 349.838869][ T27] audit: type=1400 audit(1699678740.615:378): avc: denied { create } for pid=15308 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 349.869268][T15315] veth0_virt_wifi: mtu less than device minimum [ 349.869872][T15302] loop1: detected capacity change from 0 to 2048 04:59:00 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f00000001c0)=@ringbuf, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380)}, 0x90) 04:59:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) [ 349.939987][T15302] FAULT_INJECTION: forcing a failure. [ 349.939987][T15302] name failslab, interval 1, probability 0, space 0, times 0 [ 349.952810][T15302] CPU: 0 PID: 15302 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 349.963352][T15302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 349.973452][T15302] Call Trace: [ 349.976766][T15302] [ 349.979901][T15302] dump_stack_lvl+0xda/0x130 [ 349.984545][T15302] dump_stack+0x15/0x20 04:59:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}]}, 0x38}}, 0x0) [ 349.988804][T15302] should_fail_ex+0x21f/0x230 [ 349.993573][T15302] ? iter_file_splice_write+0xeb/0x7e0 [ 349.999246][T15302] __should_failslab+0x92/0xa0 [ 350.004150][T15302] should_failslab+0x9/0x20 [ 350.008791][T15302] __kmem_cache_alloc_node+0x4e/0x210 [ 350.014227][T15302] ? splice_from_pipe+0xe0/0xe0 [ 350.019152][T15302] ? iter_file_splice_write+0xeb/0x7e0 [ 350.024766][T15302] __kmalloc+0x95/0x1a0 [ 350.028982][T15302] iter_file_splice_write+0xeb/0x7e0 [ 350.034438][T15302] ? splice_from_pipe+0xe0/0xe0 [ 350.039342][T15302] direct_splice_actor+0x8a/0xb0 [ 350.044389][T15302] splice_direct_to_actor+0x31d/0x690 [ 350.049925][T15302] ? direct_file_splice_eof+0x70/0x70 [ 350.055365][T15302] do_splice_direct+0x10d/0x190 [ 350.060520][T15302] ? do_splice_direct+0x190/0x190 [ 350.065661][T15302] do_sendfile+0x3c4/0x980 [ 350.070192][T15302] __x64_sys_sendfile64+0x110/0x150 [ 350.075451][T15302] do_syscall_64+0x44/0x110 [ 350.080100][T15302] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 350.086053][T15302] RIP: 0033:0x7f8517f84ae9 [ 350.090560][T15302] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 350.110189][T15302] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 350.118610][T15302] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 350.126585][T15302] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 04:59:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 48) 04:59:00 executing program 3: io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000000c80)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x7ff, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 04:59:00 executing program 5: bpf$MAP_CREATE(0x1e, &(0x7f0000000340), 0x48) 04:59:00 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)) 04:59:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x8}, 0x48) [ 350.134655][T15302] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 350.142862][T15302] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 350.150949][T15302] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 350.158954][T15302] [ 350.221503][T15339] loop1: detected capacity change from 0 to 2048 [ 350.242358][T15339] FAULT_INJECTION: forcing a failure. [ 350.242358][T15339] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 350.255997][T15339] CPU: 1 PID: 15339 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 350.266232][T15339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 350.276316][T15339] Call Trace: [ 350.279601][T15339] [ 350.282563][T15339] dump_stack_lvl+0xda/0x130 [ 350.287251][T15339] dump_stack+0x15/0x20 [ 350.291528][T15339] should_fail_ex+0x21f/0x230 [ 350.296477][T15339] __should_fail_alloc_page+0xfd/0x110 [ 350.302061][T15339] __alloc_pages+0x108/0x340 [ 350.306753][T15339] alloc_pages_mpol+0xb1/0x1d0 [ 350.311648][T15339] folio_alloc+0xea/0x120 [ 350.315990][T15339] filemap_alloc_folio+0x68/0x220 [ 350.321119][T15339] __filemap_get_folio+0x298/0x5a0 [ 350.326243][T15339] ? invalidate_inode_pages2_range+0x6de/0x720 [ 350.332852][T15339] pagecache_get_page+0x2a/0x90 [ 350.337756][T15339] ? fat_block_truncate_page+0x40/0x40 [ 350.343357][T15339] grab_cache_page_write_begin+0x2e/0x40 [ 350.349005][T15339] block_write_begin+0x31/0x170 [ 350.353920][T15339] cont_write_begin+0x479/0x690 [ 350.358915][T15339] fat_write_begin+0x61/0xf0 [ 350.363522][T15339] ? fat_block_truncate_page+0x40/0x40 [ 350.369152][T15339] generic_perform_write+0x1c9/0x410 [ 350.374524][T15339] ? generic_file_direct_write+0x1dc/0x1f0 [ 350.380344][T15339] __generic_file_write_iter+0xec/0x120 [ 350.385903][T15339] generic_file_write_iter+0x7d/0x1c0 [ 350.391337][T15339] do_iter_write+0x4ad/0x770 [ 350.395963][T15339] ? iter_file_splice_write+0xeb/0x7e0 [ 350.401474][T15339] vfs_iter_write+0x56/0x70 [ 350.406062][T15339] iter_file_splice_write+0x462/0x7e0 [ 350.411520][T15339] ? splice_from_pipe+0xe0/0xe0 [ 350.416406][T15339] direct_splice_actor+0x8a/0xb0 [ 350.421364][T15339] splice_direct_to_actor+0x31d/0x690 [ 350.426755][T15339] ? direct_file_splice_eof+0x70/0x70 [ 350.432413][T15339] do_splice_direct+0x10d/0x190 [ 350.437367][T15339] ? do_splice_direct+0x190/0x190 [ 350.442409][T15339] do_sendfile+0x3c4/0x980 [ 350.446869][T15339] __x64_sys_sendfile64+0x110/0x150 [ 350.452156][T15339] do_syscall_64+0x44/0x110 [ 350.456681][T15339] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 350.462958][T15339] RIP: 0033:0x7f8517f84ae9 [ 350.467377][T15339] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 350.487173][T15339] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 350.496301][T15339] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 350.504435][T15339] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 350.512558][T15339] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 350.520619][T15339] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 350.528594][T15339] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 350.536582][T15339] 04:59:01 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) (async) r5 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) ppoll(&(0x7f00000000c0)=[{r2, 0x80d0}, {r0, 0x100}, {r4, 0x304}, {r5, 0x11b}, {r0, 0x40}], 0x5, &(0x7f0000000100), &(0x7f0000000140)={[0x7]}, 0x8) (async) getpeername$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) 04:59:01 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xe}}}, 0x24}}, 0x0) 04:59:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffb}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}]}, 0x38}}, 0x0) 04:59:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000cc0)={&(0x7f0000000c00), 0xfffffeab, &(0x7f0000000080)={&(0x7f0000000c40)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@SMC_PNETID_IBPORT={0x5}]}, 0x1c}}, 0x0) 04:59:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)="45f9e8e5af9f7e488a1619ea0cd4902570249f1e29b175dfa0d3ae9be1933b972b835f966d432045a33e064403006bdb8ef95b90e76baae34f74778049ff8fa4a59adf7623aaddb922b32dbbfda740b88a07e87eb2cd97c0393db1036a1ec8a376c919cdd0b40dbb899c07f1349c7a1113f57495c795bc7e38166a7bdef463457189549f4b13279fffd050bdfea3477a62d3edea8321a2e98c65330fe7199ca6bee7202aa5a5d56c4ed4c22dbb28cebcaec033c75eb78820ad1d8ceb6f90b569e165002e702e1a206666d3c9d903ce78c73f778eae82d58317c634016a3e01ae29607f7b5ff253c607e4f60c0aa49021205073cdd574a3d4c25fbf79cc8ac99ff149ae54aa56286204e628dc2dfe4384ef74c8dac04ace6c5762d03f9e19942e4b6bbbb41fefc569cc23b3319d4ebc55551fecf8f936221e9787e744f2e1422baaa25b2f5bf59205190b7fe52f0641f149c5e00b764c493afadeaa04324783c268f48772b1c532d52d211865704db5fbafc3193385adc9855a1ad9ea0c05479329efd6c08ed22c5656eab2ea050f53bf441a9dfb4157d14b99214fa59b8b0e53200795762145a63d61c5c526edb03429e1e14072e1d7dff102fdb9801234bbbb8e0274a861dd60f3a21f129326b2f6fee61f690fa3967cdc5f6f9519282c48e28d6aa7d1b0ed07bdd72ebf1dd97b46f24ffde352095f4bffd6fdd0b9f0d60f16746f1c1ec46656cf94ae2237540c558c1863fb2ffd4619e5ee5b7aa5757e252b821e003fcef57f33cd70f19ec0b5f8098c030741147e8e4319109892fd56b22d261800b7107a393b9a7d835383e3504f5f2794f30914c4f8145ed446a06e3787eb32ab90abf595d45013c8b6d9c26cf4e60812b02427a4d2a8dcbdfaf8ace4e17f0f598676a5f26dc3615eddea77e1d68c857fbe2b39b67ccacd6afcea94b4f9592490c1a51e11f4ffc6dd4d4cdc44995b09864743b906e07a12c93045b654abf2faaf1127ee92698e09efee1d8d45ceb103973c3d1d5c98090d9af08789f867873bbeb522cb367bacaf2d94bc6fa7aab57b542af353d693230a3da636762204d96f2889f7decc9ad3992a8be2be92bdd6a7367bd64c8604ec219a92c80a7536f218926b5d18677f4bc22454a843f7ec6bfaadaec1a47896f902725cddc264226a0c7f673468459528101da2368d77d37d9ae6d52cb44efb9b5af74fdd4c8341980d7b3f4a3176c8de3c3a0144e3f327fcb30c6bda7a62ec37215367d06ef1b85fa2bc329fe99071f65b0d5a48b50139016b0753bc99c389f4aba551bf2da38b78e7b4dbb3be3ecf8749b39a022c86febf3a30070def590bd2a9cb0f95d09eac8de27c370d758e340193773a7dfbb2046e0b2e34bef073ed8368f4fbf464206fbe88c3260f6974b383bcf8a000db483d822536000df416d09dfc55c920cbc3c8b24af1757099903759e9312b576b9f04e61ae20a60d7d0ce978d193dbf9e7a20c04b4f985936402823feb4c045be085b565c283602d9f4c7efe1db4d81f126855712cb5d9cc86250c4b81f4cd823b4b3204d5e88c77f671b93f8ca0d7846a4eb429ab9aa3c8283e3aabe924b5b33d99ba5933d79856316642459e1b0806a0f7546fcf2db6159ad2f5d28c0141dc8777dbc67e3d1b02e2daa828eee0bb0fae22852012318cef6d55e0677fe28340f7c02b20ddbbeef78b6522d5c90540939b471306acadbfda2c3a91f9b5fa4d201c484b4a092a05fb2473610be8d70e662dd3113c892a5dab15e374ee246df73d53aadf43e46ef5fc5e53f81eeb8e234b4d4a26112e6db1f1ee915977a4aa2a564641ed13892342e76790b4a221977e1ac1692ff952c09f8f3405ed8867b36ca056d2b2457888cb6b5cf4a36beee3b493e26909614114a013855a1761c7597bd289bdc00ab3cbfb0735c865a025f56c2fb288e2348d65567931a3ab4bd83accb0b037b9379158ff7c2876f0444515a56d16acbb437fe9b91ede3622649ad89f377577a70f3abb37fd9f0a732cf849dd781eae1893bce173af5c455ba9f31259928ce60c338d74fcd1cf171b9fdc7db75b85114102e4c25f06540958e675ed538fc61b0243cd6a4565f8ffacb73032f13c4ba242671d2328aef233e921d19d625e79cde9d1b1c4f3e9e3a52e2f333050c1661b294a919faad9e946d893588ba0fbab294dc911af4cb782abcbf628adf724410f1014d70a0aabcaa7a9ec25c967293b1849e2dcaeafa6ce0c4c6cc82709aea742bb3e77e97f62a6953062e5eee17917ca8b6cd141f3f1708f29ecce6956380f04d27f121ac5841abb56f8c2db7c162ff0ea80652372c3762b1c8cefb434a452cc3c6e2116ec637ebaa6eb80497195f2dc027dc6d007486b4d34302962e7b1afcae8d3c50477ce229b560511b5cc08b350a2fe8c49697a110574e85acaa6b3d1410fa7ce314d250009b304b49230e4e54f6a84ea7d28907ca65ee7017de404772a7ad171737fe048fec238b8720f78a42768b0a438261b799a5cd8128cad10810eee0c034ea4514fd41cae01c6814881914bf6f67087264f0c1ca1a8991f4c32be3fea66d17968e214a571e075ce137c8c59193edcf52f2f3ba392c3242f94fc4c44d30d2a49b58a42fa60dacf646d5976969fad6de5cdc69ea41be1092a3ec33ddbb9ca8343e282d9f6de86e8bf9c79fc186ba264f22d14cf5d788030e64d7f4fea4d40f4b2a6d953a384304c549b771501b4f6fc723968121695df44dd53fefc4d439276f39ca272bf0b89a535716f6fd5ac9fb01bad86884b7bfa8de57e91a5952053d2c29b1dcc515d23277b56fb8a78a0f0bdad659c005e081a69ff4781a082ea6e938bf6c69f1ae9cfa0b5698c2e29a59ca9711efabc1bca7285fa2e26bccb25a217d78250d5445fea6c2f29f68d327b8100107", 0x815}], 0x1}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)="1309d6e8ff3753eba2c6822500266768b36b79725a757bc6b16e64ccfa64a1c31942551fbcd409fd5c6b2317d929f150cf7ada622eefb4f24530df88", 0x3c}, {&(0x7f0000000a80)="75d5a9b50779e8af955b2d40d2706f078c703ff0d9d433e4898865b6c87f05608a383bf55efa0fcbff4617fdb5cbb21619a18d70ed5d90bf709075a3a751ff998a8dc4d8b8eaee481ba19d8b1e7938906b84553a174473593271316ce51caa1e54ef4b7b8baf91ffebc8077da77523a29e6ddc51d86cd5645eacb040e3c78383489cf11d6a343e05705962b32252d6c52375f9a125f0e64bf183788dea033a98da593f8e9380", 0xa6}], 0x2}}, {{0x0, 0x0, &(0x7f00000010c0)=[{0x0}, {&(0x7f0000000d40)="0eeb182c0842b46450841de6", 0xc}, {0x0}], 0x3}}], 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:59:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 49) 04:59:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000001300)=@ipv6_newnexthop={0x40, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14, 0x3}}, @NHA_OIF={0x8, 0x5, r1}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x4}]}, 0x40}}, 0x0) 04:59:01 executing program 5: socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r0, 0x34, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180), 0x0}, 0x40) 04:59:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x4, &(0x7f0000000600)=@framed={{}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000000540)='syzkaller\x00'}, 0x90) 04:59:01 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={0x0}}, 0x81) 04:59:01 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000180)) [ 350.757720][T15346] loop1: detected capacity change from 0 to 2048 04:59:01 executing program 5: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x0) [ 351.065431][T15346] syz-executor.1: attempt to access beyond end of device [ 351.065431][T15346] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:02 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) ppoll(&(0x7f00000000c0)=[{r2, 0x80d0}, {r0, 0x100}, {r4, 0x304}, {r5, 0x11b}, {r0, 0x40}], 0x5, &(0x7f0000000100), &(0x7f0000000140)={[0x7]}, 0x8) getpeername$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) (async) close(r2) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) (async) fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) (async) ppoll(&(0x7f00000000c0)=[{r2, 0x80d0}, {r0, 0x100}, {r4, 0x304}, {r5, 0x11b}, {r0, 0x40}], 0x5, &(0x7f0000000100), &(0x7f0000000140)={[0x7]}, 0x8) (async) getpeername$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) (async) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) (async) 04:59:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4) sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) sendto$inet(r0, &(0x7f00000004c0)="43cb12c6db497699528530fefd5d799feb2d636270d12e3f833265139ca2f3902bda86f768eb13d790b54eeea91c4dce97d66258b6317481b8fd8566a0c0f4e1acf5591178bb4008bc0a2ef065d867f8fc234b5f96cfe50aad1a7fefd64aa374345dcc4dbf42250092a5c5f9b0fe5dbb7c9841cad1259bfe095d69f96ea1855a4bf38aa56cdbab05762a86e3a70915cb9c230e0b913f011e63abfd3781033477f05f7f31a77eb32f243b54c0985e1b447ca08858ddf511404c7e0cfc533d400b76a5114baff01724c9c8b9d1fe58c2d692a0fc56681183e03d875f810e843d80fd41eb762ee733fa9e319a2c4f", 0xed, 0x4004, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) 04:59:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:59:02 executing program 5: socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001380)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001340)={&(0x7f0000001240)=@RTM_NEWNSID={0x1c, 0x58, 0x201, 0x0, 0x0, {}, [@NETNSA_FD={0x8}]}, 0x1c}}, 0x80) 04:59:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 50) 04:59:02 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0xc0189436, &(0x7f0000000600)) 04:59:02 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@map=0x1, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 04:59:02 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}, {0x0, 0xe}}}, 0x24}}, 0x0) 04:59:02 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) [ 351.594156][T15376] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 04:59:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 04:59:02 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 04:59:02 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7907e486dd631703a2000000200000000000000000000000007fffffdc4bac4640ae3e42ccdd468eff000195a20eacdb01c447a7090000008e7781b6000000000000"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) [ 351.641720][T15371] loop1: detected capacity change from 0 to 2048 04:59:02 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) 04:59:02 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000d80)=@security={'security\x00', 0xe, 0x4, 0x378, 0xffffffff, 0x0, 0x198, 0x2a0, 0xffffffff, 0xffffffff, 0x3c0, 0x3c0, 0x3c0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@local}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d8) 04:59:02 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7907e486dd631703a2000000200000000000000000000000007fffffdc4bac4640ae3e42ccdd468eff000195a20eacdb01c447a7090000008e7781b6000000000000"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7907e486dd631703a2000000200000000000000000000000007fffffdc4bac4640ae3e42ccdd468eff000195a20eacdb01c447a7090000008e7781b6000000000000"], 0xfdef) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) (async) 04:59:02 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x8902, &(0x7f0000000600)) 04:59:02 executing program 3: pipe(&(0x7f0000000500)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000100)={0x20000008}) 04:59:02 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8924, &(0x7f0000000000)={'vxcan1\x00'}) 04:59:02 executing program 2: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x40086602, &(0x7f0000000600)) 04:59:02 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7907e486dd631703a2000000200000000000000000000000007fffffdc4bac4640ae3e42ccdd468eff000195a20eacdb01c447a7090000008e7781b6000000000000"], 0xfdef) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 04:59:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 51) 04:59:02 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[], 0x20}}, 0x0) [ 352.002798][T15371] syz-executor.1: attempt to access beyond end of device [ 352.002798][T15371] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:02 executing program 2: r0 = socket$inet(0x2, 0x803, 0x2) setsockopt$inet_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) 04:59:02 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x80047453, 0x0) 04:59:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 04:59:02 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 04:59:02 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) [ 352.045640][ T27] audit: type=1400 audit(1699678742.815:379): avc: denied { setattr } for pid=15407 comm="syz-executor.2" path="socket:[43758]" dev="sockfs" ino=43758 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 04:59:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x0, 0x40, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x48) 04:59:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) [ 352.130099][T15420] loop1: detected capacity change from 0 to 2048 04:59:03 executing program 2: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x8940, &(0x7f0000000600)) 04:59:03 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x7da041, 0x0) 04:59:03 executing program 3: r0 = epoll_create(0x1ff) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) 04:59:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 04:59:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000001300)=@ipv6_newnexthop={0x20, 0x68, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x4}, [@NHA_OIF={0x8, 0x5, r1}]}, 0x20}}, 0x0) 04:59:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 52) 04:59:03 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@map, 0xffffffffffffffff, 0x37, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) 04:59:03 executing program 5: socketpair(0x2c, 0x3, 0x3ff, &(0x7f0000000040)) [ 352.405405][T15420] syz-executor.1: attempt to access beyond end of device [ 352.405405][T15420] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x1f00, &(0x7f0000000700)={&(0x7f0000001300)=@ipv6_newnexthop={0x40, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP={0x18, 0x8, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14, 0x3}}, @NHA_OIF={0x8, 0x5, r1}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x4}]}, 0x40}}, 0x0) 04:59:03 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x141, 0x0) fallocate(r3, 0x11, 0xf4, 0x8010000) fallocate(r3, 0x20, 0x0, 0xffff7fef000) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000040)) 04:59:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @info_reply}}}}, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 04:59:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}]}, 0x34}}, 0x0) 04:59:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4) sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)="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", 0x68a}], 0x1}}], 0x1, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:59:03 executing program 4: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@map=0x1, 0x2e, 0x0, 0x0, &(0x7f0000000300)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) 04:59:03 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x70bd2a}, 0x14}}, 0x0) 04:59:03 executing program 3: syz_emit_ethernet(0x1e, &(0x7f0000000100)={@local, @link_local, @void, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "a604f6cfe89aef5d"}}}}, 0x0) 04:59:03 executing program 4: mmap$xdp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000003, 0x30, 0xffffffffffffffff, 0x0) [ 352.540750][T15452] loop1: detected capacity change from 0 to 2048 04:59:03 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[], 0x20}}, 0x0) 04:59:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x0, 0x40, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x4}, 0x48) 04:59:03 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={@ifindex=r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 04:59:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 53) 04:59:03 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x141, 0x0) fallocate(r3, 0x11, 0xf4, 0x8010000) (async) fallocate(r3, 0x20, 0x0, 0xffff7fef000) (async) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000040)) 04:59:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4) sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)="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", 0x83d}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 04:59:03 executing program 3: socketpair(0x23, 0x2, 0x0, &(0x7f0000000040)) [ 352.860839][T15452] syz-executor.1: attempt to access beyond end of device [ 352.860839][T15452] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 352.951462][T15480] loop1: detected capacity change from 0 to 2048 [ 353.230597][T15480] syz-executor.1: attempt to access beyond end of device [ 353.230597][T15480] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@empty}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 04:59:04 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x32) 04:59:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@gettclass={0x24, 0x2a, 0x1}, 0x24}}, 0x0) 04:59:04 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x141, 0x0) fallocate(r3, 0x11, 0xf4, 0x8010000) (async) fallocate(r3, 0x20, 0x0, 0xffff7fef000) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000040)) 04:59:04 executing program 5: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x5452, &(0x7f0000000600)) 04:59:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 54) 04:59:04 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 04:59:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@gettaction={0x28, 0x32, 0x1, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x28}}, 0x0) 04:59:04 executing program 5: syz_emit_ethernet(0x1e, &(0x7f0000000100)={@local, @link_local, @void, {@can={0xc, {{0x4}, 0x0, 0x0, 0x0, 0x0, "a604f6cfe89aef5d"}}}}, 0x0) 04:59:04 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newtfilter={0x2c, 0x2c, 0x200, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x2, 0xfff2}, {0xfff2, 0xf}, {0xa, 0xfff1}}, [@TCA_CHAIN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000811) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) 04:59:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x19, &(0x7f00000000c0)={@empty}, &(0x7f0000000100)=0x14) 04:59:04 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f00000026c0)=@name, 0x10) [ 353.442022][T15494] loop1: detected capacity change from 0 to 2048 [ 353.479925][T15507] tipc: Can't bind to reserved service type 0 [ 353.483345][ T27] audit: type=1400 audit(1699678744.255:380): avc: denied { bind } for pid=15506 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 04:59:04 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x20004880}, 0x0) 04:59:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x12) 04:59:04 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newtfilter={0x2c, 0x2c, 0x200, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x2, 0xfff2}, {0xfff2, 0xf}, {0xa, 0xfff1}}, [@TCA_CHAIN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000811) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) 04:59:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="a09a1b26f458c54b738c6b7718f84b27aa40682ea88c7722e77ca7fa8d102cf3ea7923b9948d7fcc0d924d108aec4d65e3a14f7a5692a06e362a3230e14522e843ad705ea48f55d1dc51753349fe323fd4586f1698f476f4ac677c19fd573430e9c415616db56f22f21f76a8a0c4937527eec7d9e40d684fd9601aed7ff0b7a616bdb4010b927079e6b03ad3e9921afc613df2bc9ba12c7928e39deba21e050ecdbd9a921562430162343d1e1d76532b7a4f2183c19dcf2989afa95bf3abe741a485b96c0d295502c6", 0xc9}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) sendto$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x4004, 0x0, 0x0) 04:59:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 55) 04:59:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={0x0, 0xffffff27}}, 0x0) 04:59:04 executing program 5: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x2, 0xfffffffffffffffc) 04:59:04 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631703a2000000200000000000000000000000007fffffff000100000000f771273fa7090000008e7781b6"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) (async) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newtfilter={0x2c, 0x2c, 0x200, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x2, 0xfff2}, {0xfff2, 0xf}, {0xa, 0xfff1}}, [@TCA_CHAIN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000811) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) 04:59:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:04 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@map=0x1, 0x2e, 0x0, 0x84f4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 04:59:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x19, 0x0, &(0x7f0000000100)) 04:59:04 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8932, &(0x7f0000000000)={'vxcan1\x00'}) [ 353.819409][T15494] syz-executor.1: attempt to access beyond end of device [ 353.819409][T15494] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:04 executing program 5: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000600)) r1 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x100000000) 04:59:04 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x40086602, &(0x7f0000000000)={'vxcan1\x00'}) [ 353.916029][T15533] loop1: detected capacity change from 0 to 2048 [ 354.214919][T15533] syz-executor.1: attempt to access beyond end of device [ 354.214919][T15533] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:05 executing program 2: syz_emit_ethernet(0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000005158000000000805"], 0x0) 04:59:05 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8922, &(0x7f0000000000)={'vxcan1\x00'}) 04:59:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:05 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@ifindex, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 04:59:05 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x20}}, 0x0) 04:59:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 56) 04:59:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000002200)=""/4096, &(0x7f0000003200)=0x1000) 04:59:05 executing program 5: alarm(0x3f) 04:59:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3b8, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) 04:59:05 executing program 2: socket(0x11, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) 04:59:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:05 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000001a80), 0x4000, 0x0) 04:59:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x32, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) 04:59:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x1) [ 354.466418][T15550] loop1: detected capacity change from 0 to 2048 [ 354.518861][T15550] FAULT_INJECTION: forcing a failure. [ 354.518861][T15550] name failslab, interval 1, probability 0, space 0, times 0 [ 354.531607][T15550] CPU: 0 PID: 15550 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 354.541702][T15550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 354.551841][T15550] Call Trace: [ 354.555234][T15550] [ 354.558281][T15550] dump_stack_lvl+0xda/0x130 [ 354.563000][T15550] dump_stack+0x15/0x20 [ 354.567210][T15550] should_fail_ex+0x21f/0x230 [ 354.571952][T15550] ? iter_file_splice_write+0xeb/0x7e0 [ 354.577617][T15550] __should_failslab+0x92/0xa0 [ 354.582448][T15550] should_failslab+0x9/0x20 [ 354.587136][T15550] __kmem_cache_alloc_node+0x4e/0x210 [ 354.592558][T15550] ? splice_from_pipe+0xe0/0xe0 [ 354.597475][T15550] ? iter_file_splice_write+0xeb/0x7e0 [ 354.603173][T15550] __kmalloc+0x95/0x1a0 [ 354.607370][T15550] iter_file_splice_write+0xeb/0x7e0 [ 354.612823][T15550] ? splice_from_pipe+0xe0/0xe0 04:59:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x2, 0x508, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x30}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568) [ 354.617753][T15550] direct_splice_actor+0x8a/0xb0 [ 354.622830][T15550] splice_direct_to_actor+0x31d/0x690 [ 354.627689][ T27] audit: type=1400 audit(1699678745.365:381): avc: denied { read } for pid=15569 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 354.628441][T15550] ? direct_file_splice_eof+0x70/0x70 [ 354.655030][T15550] do_splice_direct+0x10d/0x190 [ 354.660073][T15550] ? do_splice_direct+0x190/0x190 [ 354.665233][T15550] do_sendfile+0x3c4/0x980 [ 354.669699][T15550] __x64_sys_sendfile64+0x110/0x150 [ 354.674981][T15550] do_syscall_64+0x44/0x110 [ 354.679620][T15550] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 354.685604][T15550] RIP: 0033:0x7f8517f84ae9 [ 354.690083][T15550] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 354.709823][T15550] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 04:59:05 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@cgroup, 0x4, 0x0, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100), &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x12) 04:59:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x541b, &(0x7f00000007c0)={0xd, 0x0, 0x0, 0x0, 0x17803}) 04:59:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4e, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:05 executing program 2: get_robust_list(0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080)) 04:59:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 57) 04:59:05 executing program 2: r0 = socket(0x11, 0x3, 0x0) recvmsg$can_raw(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x2042) [ 354.718384][T15550] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 354.726590][T15550] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 354.734572][T15550] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 354.742555][T15550] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 354.750533][T15550] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 354.758665][T15550] 04:59:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) 04:59:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2e, 0x0, 0x0) 04:59:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@security={'security\x00', 0xe, 0x4, 0x370, 0xffffffff, 0x1d0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2f8, 0x2f8, 0x2f8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "2283e43fb69a522c992ae27204660631e4e081022e48053867267e159d17"}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "d269cac4236e6c314f83d5172c376bc5bc17a74188d1a6e521cb042a0402"}}}, {{@ipv6={@mcast1, @mcast1, [], [], 'dvmrp0\x00', 'vxcan1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) 04:59:05 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:05 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x36, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x6, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) [ 354.836610][ T27] audit: type=1400 audit(1699678745.605:382): avc: denied { read } for pid=15590 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 04:59:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000001240)) [ 354.918291][T15603] loop1: detected capacity change from 0 to 2048 [ 354.966161][T15603] FAULT_INJECTION: forcing a failure. [ 354.966161][T15603] name failslab, interval 1, probability 0, space 0, times 0 [ 354.979055][T15603] CPU: 0 PID: 15603 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 354.989210][T15603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 354.999431][T15603] Call Trace: [ 355.002792][T15603] [ 355.005724][T15603] dump_stack_lvl+0xda/0x130 [ 355.010332][T15603] dump_stack+0x15/0x20 [ 355.014501][T15603] should_fail_ex+0x21f/0x230 [ 355.019349][T15603] ? __blockdev_direct_IO+0x137/0x1f90 [ 355.024851][T15603] __should_failslab+0x92/0xa0 [ 355.029704][T15603] should_failslab+0x9/0x20 [ 355.034268][T15603] kmem_cache_alloc+0x4e/0x250 [ 355.039178][T15603] __blockdev_direct_IO+0x137/0x1f90 [ 355.044561][T15603] ? __rcu_read_unlock+0x4d/0x70 [ 355.049531][T15603] ? find_get_entries+0x397/0x410 [ 355.054629][T15603] ? fat_block_truncate_page+0x40/0x40 [ 355.060133][T15603] ? invalidate_inode_pages2_range+0x6cc/0x720 [ 355.066460][T15603] fat_direct_IO+0x110/0x1d0 [ 355.071134][T15603] generic_file_direct_write+0xab/0x1f0 [ 355.076715][T15603] ? mnt_put_write_access_file+0x95/0xb0 [ 355.082466][T15603] __generic_file_write_iter+0xae/0x120 [ 355.088149][T15603] generic_file_write_iter+0x7d/0x1c0 [ 355.093638][T15603] do_iter_write+0x4ad/0x770 [ 355.098371][T15603] ? iter_file_splice_write+0xeb/0x7e0 [ 355.103912][T15603] vfs_iter_write+0x56/0x70 [ 355.108493][T15603] iter_file_splice_write+0x462/0x7e0 [ 355.113927][T15603] ? splice_from_pipe+0xe0/0xe0 [ 355.118805][T15603] direct_splice_actor+0x8a/0xb0 [ 355.123853][T15603] splice_direct_to_actor+0x31d/0x690 [ 355.129272][T15603] ? direct_file_splice_eof+0x70/0x70 [ 355.134687][T15603] do_splice_direct+0x10d/0x190 [ 355.139714][T15603] ? do_splice_direct+0x190/0x190 [ 355.144767][T15603] do_sendfile+0x3c4/0x980 [ 355.149227][T15603] __x64_sys_sendfile64+0x110/0x150 [ 355.154502][T15603] do_syscall_64+0x44/0x110 [ 355.159095][T15603] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 355.165101][T15603] RIP: 0033:0x7f8517f84ae9 [ 355.169837][T15603] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 355.189582][T15603] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 355.198103][T15603] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 355.206140][T15603] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 04:59:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 58) 04:59:06 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1fff8, 0x0, 0x0) 04:59:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000000)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @multicast2, @broadcast, {[@lsrr={0x83, 0x3}]}}}}}) 04:59:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x23, 0x0, 0x0) 04:59:06 executing program 0: socket$netlink(0x10, 0x3, 0x6) [ 355.214143][T15603] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 355.222128][T15603] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 355.230115][T15603] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 355.238106][T15603] 04:59:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x27, 0x0, 0x0) 04:59:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) tgkill(0x0, 0x0, 0x34) ioprio_get$pid(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x2000011a) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xf, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$loop_ctrl(0xffffff9c, &(0x7f0000001280), 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0xd, 0x0, 0x0, 0x20040006, 0x17803}) 04:59:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', 0x0}) 04:59:06 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=',\x00'}, 0x47) [ 355.290093][T15623] loop1: detected capacity change from 0 to 2048 04:59:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 59) 04:59:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x42, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x8000000, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}}) 04:59:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, 0x0, 0x0) 04:59:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x3b0, 0xffffffff, 0x248, 0xc0, 0x248, 0xffffffff, 0xffffffff, 0x438, 0x438, 0x438, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@dscp={{0x28}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@uncond, 0x0, 0x128, 0x188, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8}, {{@ipv4=@multicast1, [], @ipv4=@multicast2, [], @ipv6=@local, [], @ipv4=@dev}}}]}, @common=@CLUSTERIP={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) 04:59:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) [ 355.593189][T15623] syz-executor.1: attempt to access beyond end of device [ 355.593189][T15623] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 355.692116][T15653] loop1: detected capacity change from 0 to 2048 [ 355.954731][T15653] syz-executor.1: attempt to access beyond end of device [ 355.954731][T15653] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:06 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2a, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x23, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x35, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 60) 04:59:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005200)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000000)={0x10}, 0x10}, {&(0x7f00000003c0)={0x10, 0x38, 0x305}, 0x10}], 0x2}, 0x0) 04:59:06 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:06 executing program 2: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) 04:59:07 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0x9, 0x0, 0x0) 04:59:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x4, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:07 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 04:59:07 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000140), 0x4) 04:59:07 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) [ 356.241187][T15671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15671 comm=syz-executor.4 [ 356.254055][T15671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=15671 comm=syz-executor.4 04:59:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x33, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, 0x0, 0x0) 04:59:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x2, 0x40, 0x0, 0x0) [ 356.294239][T15669] loop1: detected capacity change from 0 to 2048 04:59:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x23, 0x4) 04:59:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 61) 04:59:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, 0x0, 0x0) 04:59:07 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@ifindex, 0xffffffffffffffff, 0x5, 0x0, 0x0, @link_id}, 0x20) 04:59:07 executing program 2: socket(0x1, 0x3, 0x8) 04:59:07 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000540)=[{}], &(0x7f0000000580)=0x8) 04:59:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:59:07 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000002c0)='ns/user\x00') [ 356.591249][T15669] syz-executor.1: attempt to access beyond end of device [ 356.591249][T15669] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, 0x0, 0x0) 04:59:07 executing program 2: mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x20088, 0x0) 04:59:07 executing program 0: syz_clone(0x4a00000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:59:07 executing program 4: r0 = socket(0x11, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000), 0xc) 04:59:07 executing program 4: r0 = socket(0x11, 0x3, 0x0) recvmsg$can_raw(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) [ 356.679910][T15704] loop1: detected capacity change from 0 to 2048 04:59:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 04:59:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 62) 04:59:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3b8, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20}}]}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) 04:59:07 executing program 0: r0 = socket(0x11, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 04:59:07 executing program 5: sync() socket$inet6_udplite(0xa, 0x2, 0x88) 04:59:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x2, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) [ 356.967494][T15704] syz-executor.1: attempt to access beyond end of device [ 356.967494][T15704] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:07 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000740)=[{}], 0x8) 04:59:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3b0, 0x150, 0x308, 0x150, 0x150, 0x150, 0x1e8, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20}}]}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) 04:59:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 04:59:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) [ 357.067652][T15730] loop1: detected capacity change from 0 to 2048 [ 357.093909][ T27] audit: type=1400 audit(1699678747.865:383): avc: denied { setopt } for pid=15732 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 357.346276][T15730] syz-executor.1: attempt to access beyond end of device [ 357.346276][T15730] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x15, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:08 executing program 5: sync() socket$inet6_udplite(0xa, 0x2, 0x88) 04:59:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 04:59:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x3, 0x0, &(0x7f0000000000)=0xe) 04:59:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x1c, 0x4) 04:59:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 63) 04:59:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:08 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c}, 0x1c}}, 0x1) 04:59:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@mpls_newroute={0x1c, 0x18, 0x2a3f1e67312923a5}, 0x1c}}, 0x0) 04:59:08 executing program 0: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={@map, 0xffffffffffffffff, 0x21, 0x0, 0xffffffffffffffff, @link_id}, 0x20) 04:59:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 04:59:08 executing program 5: sync() socket$inet6_udplite(0xa, 0x2, 0x88) [ 357.595755][ T27] audit: type=1400 audit(1699678748.365:384): avc: denied { audit_read } for pid=15741 comm="syz-executor.2" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 357.632962][T15749] loop1: detected capacity change from 0 to 2048 04:59:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:08 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000001d80)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x2000) 04:59:08 executing program 4: syz_open_dev$vcsn(&(0x7f0000000140), 0x0, 0x511482) 04:59:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xf, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:08 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x2041) [ 357.700287][T15749] FAULT_INJECTION: forcing a failure. [ 357.700287][T15749] name failslab, interval 1, probability 0, space 0, times 0 [ 357.713188][T15749] CPU: 0 PID: 15749 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 357.723460][T15749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 357.733669][T15749] Call Trace: [ 357.737014][T15749] [ 357.739965][T15749] dump_stack_lvl+0xda/0x130 [ 357.744612][T15749] dump_stack+0x15/0x20 [ 357.748809][T15749] should_fail_ex+0x21f/0x230 [ 357.753557][T15749] ? iter_file_splice_write+0xeb/0x7e0 [ 357.759063][T15749] __should_failslab+0x92/0xa0 [ 357.764019][T15749] should_failslab+0x9/0x20 [ 357.768573][T15749] __kmem_cache_alloc_node+0x4e/0x210 [ 357.774053][T15749] ? splice_from_pipe+0xe0/0xe0 [ 357.778944][T15749] ? iter_file_splice_write+0xeb/0x7e0 [ 357.784545][T15749] __kmalloc+0x95/0x1a0 [ 357.788767][T15749] iter_file_splice_write+0xeb/0x7e0 [ 357.794128][T15749] ? splice_from_pipe+0xe0/0xe0 [ 357.799046][T15749] direct_splice_actor+0x8a/0xb0 [ 357.804097][T15749] splice_direct_to_actor+0x31d/0x690 [ 357.809573][T15749] ? direct_file_splice_eof+0x70/0x70 [ 357.815104][T15749] do_splice_direct+0x10d/0x190 [ 357.820183][T15749] ? do_splice_direct+0x190/0x190 [ 357.825356][T15749] do_sendfile+0x3c4/0x980 [ 357.829982][T15749] __x64_sys_sendfile64+0x110/0x150 [ 357.830092][ T27] audit: type=1400 audit(1699678748.495:385): avc: denied { read } for pid=15767 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 357.835377][T15749] do_syscall_64+0x44/0x110 [ 357.859658][T15749] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 357.865672][T15749] RIP: 0033:0x7f8517f84ae9 [ 357.870135][T15749] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 357.889827][T15749] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 04:59:08 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001280)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0x0, @prog_id}, 0x20) 04:59:08 executing program 5: sync() socket$inet6_udplite(0xa, 0x2, 0x88) 04:59:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r1) sendmsg$NFC_CMD_GET_SE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r2, 0x301}, 0x14}}, 0x0) 04:59:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x9, 0x3, 0x260, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x1e8, 0xffffffff, 0xffffffff, 0x1e8, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@uncond, 0x0, 0xc8, 0x130, 0x0, {}, [@common=@ah={{0x30}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x98, 0x0, {}, [@inet]}, @unspec}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x253) 04:59:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 64) 04:59:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) [ 357.898344][T15749] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 357.906514][T15749] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 357.914496][T15749] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 357.922487][T15749] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 357.930559][T15749] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 357.938542][T15749] 04:59:08 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000200)={0x9}, 0x0, 0x0, 0x0) 04:59:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x1e8, 0xffffffff, 0xffffffff, 0x1e8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) 04:59:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002a00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x300, &(0x7f0000002900)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x20}, 0x0) 04:59:08 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0x5, 0x0, 0x0) 04:59:08 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, &(0x7f0000000540)) 04:59:08 executing program 4: socket(0x2, 0x2, 0x8) 04:59:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @local}}}}) 04:59:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 358.027290][T15789] loop1: detected capacity change from 0 to 2048 [ 358.096062][T15789] FAULT_INJECTION: forcing a failure. [ 358.096062][T15789] name failslab, interval 1, probability 0, space 0, times 0 [ 358.109060][T15789] CPU: 1 PID: 15789 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 358.119163][T15789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 358.129639][T15789] Call Trace: [ 358.132959][T15789] [ 358.135922][T15789] dump_stack_lvl+0xda/0x130 [ 358.140854][T15789] dump_stack+0x15/0x20 [ 358.145102][T15789] should_fail_ex+0x21f/0x230 [ 358.149878][T15789] ? __blockdev_direct_IO+0x137/0x1f90 [ 358.155409][T15789] __should_failslab+0x92/0xa0 [ 358.160282][T15789] should_failslab+0x9/0x20 [ 358.165115][T15789] kmem_cache_alloc+0x4e/0x250 [ 358.170177][T15789] __blockdev_direct_IO+0x137/0x1f90 [ 358.175622][T15789] ? __rcu_read_unlock+0x4d/0x70 [ 358.180913][T15789] ? find_get_entries+0x397/0x410 [ 358.185980][T15789] ? fat_block_truncate_page+0x40/0x40 [ 358.191659][T15789] ? invalidate_inode_pages2_range+0x6cc/0x720 [ 358.197841][T15789] fat_direct_IO+0x110/0x1d0 [ 358.202477][T15789] generic_file_direct_write+0xab/0x1f0 [ 358.208205][T15789] ? mnt_put_write_access_file+0x95/0xb0 [ 358.213931][T15789] __generic_file_write_iter+0xae/0x120 [ 358.219504][T15789] generic_file_write_iter+0x7d/0x1c0 [ 358.224887][T15789] do_iter_write+0x4ad/0x770 [ 358.229529][T15789] ? iter_file_splice_write+0xeb/0x7e0 [ 358.235183][T15789] vfs_iter_write+0x56/0x70 [ 358.239733][T15789] iter_file_splice_write+0x462/0x7e0 [ 358.245143][T15789] ? splice_from_pipe+0xe0/0xe0 [ 358.250057][T15789] direct_splice_actor+0x8a/0xb0 [ 358.255059][T15789] splice_direct_to_actor+0x31d/0x690 [ 358.260459][T15789] ? direct_file_splice_eof+0x70/0x70 [ 358.265922][T15789] do_splice_direct+0x10d/0x190 [ 358.270835][T15789] ? do_splice_direct+0x190/0x190 [ 358.275988][T15789] do_sendfile+0x3c4/0x980 [ 358.280440][T15789] __x64_sys_sendfile64+0x110/0x150 [ 358.285662][T15789] do_syscall_64+0x44/0x110 [ 358.290322][T15789] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 358.296382][T15789] RIP: 0033:0x7f8517f84ae9 [ 358.300799][T15789] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 358.320617][T15789] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 358.329102][T15789] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 358.337250][T15789] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 04:59:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 65) 04:59:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x548, 0x238, 0x3f8, 0x308, 0x3f8, 0x238, 0x518, 0x518, 0x518, 0x518, 0x518, 0x6, 0x0, {[{{@ipv6={@dev, @private1, [], [], 'team0\x00', 'veth1\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv6=@remote}}}, {{@ipv6={@loopback, @local, [], [], 'veth1_macvtap\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'bridge0\x00', 'wg0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@local}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a8) 04:59:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xc, 0x0, &(0x7f0000000740)=0x4) 04:59:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2, 0x0, 0x0) 04:59:09 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@ifindex, 0xffffffffffffffff, 0x3, 0x0, 0x0, @prog_id}, 0x20) [ 358.345226][T15789] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 358.353239][T15789] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 358.361279][T15789] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 358.369328][T15789] 04:59:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@mpls_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0) 04:59:09 executing program 0: socket$inet6(0xa, 0x80801, 0x6) 04:59:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000000)=""/9, &(0x7f0000000080)=0x9) 04:59:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x34, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 04:59:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x10, 0x0, 0x0) 04:59:09 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000002440), 0x40, 0x0) [ 358.465156][T15828] loop1: detected capacity change from 0 to 2048 04:59:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 66) 04:59:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}]}, 0x2c}}, 0x0) 04:59:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002a00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1, &(0x7f0000002900)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x20}, 0x0) 04:59:09 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0x2, 0x0, 0x0) 04:59:09 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3b, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {0xa}, [@NDA_LINK_NETNSID={0x8}]}, 0x24}}, 0x0) 04:59:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x13, 0x0, 0x0) [ 358.755698][T15828] syz-executor.1: attempt to access beyond end of device [ 358.755698][T15828] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:09 executing program 5: r0 = socket(0x11, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0x40, 0x0, 0x0) 04:59:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}]}, 0x2c}}, 0x0) 04:59:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002a00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1, &(0x7f0000002900)=[@cred={{0xf, 0x1, 0x2, {0xffffffffffffffff}}}], 0x20}, 0x0) [ 358.886641][T15856] loop1: detected capacity change from 0 to 2048 04:59:09 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000001c0)="a3", &(0x7f00000007c0)="1e"}, 0x50) 04:59:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, 0x0, 0x2) 04:59:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 67) 04:59:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}]}, 0x2c}}, 0x0) 04:59:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1a, 0x0, 0x0) 04:59:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2c, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:09 executing program 0: syz_open_dev$vcsn(&(0x7f0000000780), 0x0, 0x0) times(&(0x7f0000000040)) [ 359.138460][T15856] syz-executor.1: attempt to access beyond end of device [ 359.138460][T15856] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) 04:59:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x2f8, 0xffffffff, 0x248, 0xc0, 0x248, 0xffffffff, 0xffffffff, 0x438, 0x438, 0x438, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@dscp={{0x28}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x358) 04:59:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x30, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x30}}, 0x0) 04:59:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@bridge_getneigh={0x20}, 0x20}}, 0x0) 04:59:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x7, 0x0, 0x0) [ 359.225693][T15876] loop1: detected capacity change from 0 to 2048 04:59:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 68) 04:59:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xa, 0x0, 0x0) 04:59:10 executing program 5: syz_clone(0xd000000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:59:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000140)=0x1f, 0x4) 04:59:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2f, 0x0, 0x0) 04:59:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x18}}, 0x0) 04:59:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x48, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000540)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={0x0}}, 0x0) 04:59:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x18}}, 0x0) [ 359.533180][T15876] syz-executor.1: attempt to access beyond end of device [ 359.533180][T15876] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x200005e8, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x30}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568) 04:59:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xfffffffffffffd99) 04:59:10 executing program 5: r0 = socket(0x11, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0x11, 0x0, 0x0) [ 359.645843][T15906] loop1: detected capacity change from 0 to 2048 04:59:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 69) 04:59:10 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000480), 0x0, 0x0) connect$netlink(r0, 0x0, 0x0) 04:59:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x18}}, 0x0) 04:59:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:10 executing program 5: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 04:59:10 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)="1e"}, 0x50) 04:59:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x508, 0x438, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x30}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568) [ 359.926862][T15906] syz-executor.1: attempt to access beyond end of device [ 359.926862][T15906] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x3, &(0x7f0000000600)=@framed, &(0x7f0000000540)='syzkaller\x00'}, 0x90) 04:59:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x4}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x1c}}, 0x0) 04:59:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xc, 0x0, &(0x7f0000000740)) 04:59:10 executing program 4: socket(0x11, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) [ 360.031570][T15934] x_tables: duplicate underflow at hook 1 [ 360.057340][T15929] loop1: detected capacity change from 0 to 2048 04:59:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'tunl0\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x9, 0x0, 0x0, @multicast2, @remote}}}}) 04:59:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 70) 04:59:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 04:59:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {0xa}, [@NDA_LINK_NETNSID={0x8}]}, 0x24}}, 0x0) 04:59:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x4}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x1c}}, 0x0) 04:59:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x32, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) [ 360.327588][T15929] syz-executor.1: attempt to access beyond end of device [ 360.327588][T15929] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x4}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x1c}}, 0x0) 04:59:11 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 04:59:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000006840)={0x0, 0x0, &(0x7f0000006780)=[{&(0x7f0000000c40)={0x10}, 0x10}, {&(0x7f00000060c0)={0x10, 0x0, 0x1}, 0x10}], 0x2}, 0x0) 04:59:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @multicast2}}}}) [ 360.473598][T15956] loop1: detected capacity change from 0 to 2048 [ 360.488057][T15956] FAULT_INJECTION: forcing a failure. [ 360.488057][T15956] name failslab, interval 1, probability 0, space 0, times 0 [ 360.500849][T15956] CPU: 1 PID: 15956 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 360.511031][T15956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 360.521144][T15956] Call Trace: [ 360.524424][T15956] [ 360.527490][T15956] dump_stack_lvl+0xda/0x130 [ 360.532096][T15956] dump_stack+0x15/0x20 [ 360.536288][T15956] should_fail_ex+0x21f/0x230 [ 360.541108][T15956] ? iter_file_splice_write+0xeb/0x7e0 [ 360.546663][T15956] __should_failslab+0x92/0xa0 [ 360.551524][T15956] should_failslab+0x9/0x20 [ 360.556038][T15956] __kmem_cache_alloc_node+0x4e/0x210 [ 360.561442][T15956] ? splice_from_pipe+0xe0/0xe0 [ 360.566311][T15956] ? iter_file_splice_write+0xeb/0x7e0 [ 360.571808][T15956] __kmalloc+0x95/0x1a0 [ 360.576085][T15956] iter_file_splice_write+0xeb/0x7e0 [ 360.581404][T15956] ? splice_from_pipe+0xe0/0xe0 [ 360.586377][T15956] direct_splice_actor+0x8a/0xb0 [ 360.591472][T15956] splice_direct_to_actor+0x31d/0x690 [ 360.596942][T15956] ? direct_file_splice_eof+0x70/0x70 [ 360.602403][T15956] do_splice_direct+0x10d/0x190 [ 360.607488][T15956] ? do_splice_direct+0x190/0x190 [ 360.612648][T15956] do_sendfile+0x3c4/0x980 [ 360.617147][T15956] __x64_sys_sendfile64+0x110/0x150 [ 360.622380][T15956] do_syscall_64+0x44/0x110 [ 360.627002][T15956] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 360.632918][T15956] RIP: 0033:0x7f8517f84ae9 [ 360.637402][T15956] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 360.657201][T15956] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 360.665640][T15956] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 04:59:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x1fffffbf, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20}}]}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) 04:59:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x12, 0x0, 0x0) 04:59:11 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x50) 04:59:11 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 04:59:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 71) 04:59:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x18, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x23, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:11 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) [ 360.673714][T15956] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 360.681727][T15956] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 360.689888][T15956] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 360.697959][T15956] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 360.706074][T15956] 04:59:11 executing program 3: r0 = socket(0x11, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0xc, 0x0, 0x0) 04:59:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)=[{0x0, 0x220}], 0x1, &(0x7f00000017c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20}, 0x0) 04:59:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:11 executing program 5: syz_open_dev$vcsn(&(0x7f0000000400), 0x1, 0x4902) [ 360.850169][T15975] loop1: detected capacity change from 0 to 2048 [ 360.868100][T15975] FAULT_INJECTION: forcing a failure. [ 360.868100][T15975] name failslab, interval 1, probability 0, space 0, times 0 [ 360.880835][T15975] CPU: 0 PID: 15975 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 360.891014][T15975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 360.901204][T15975] Call Trace: [ 360.904656][T15975] [ 360.907750][T15975] dump_stack_lvl+0xda/0x130 [ 360.912390][T15975] dump_stack+0x15/0x20 [ 360.916747][T15975] should_fail_ex+0x21f/0x230 [ 360.921562][T15975] ? __blockdev_direct_IO+0x137/0x1f90 [ 360.927231][T15975] __should_failslab+0x92/0xa0 [ 360.932075][T15975] should_failslab+0x9/0x20 [ 360.936667][T15975] kmem_cache_alloc+0x4e/0x250 [ 360.941574][T15975] __blockdev_direct_IO+0x137/0x1f90 [ 360.947007][T15975] ? __rcu_read_unlock+0x4d/0x70 [ 360.952060][T15975] ? find_get_entries+0x397/0x410 [ 360.957167][T15975] ? fat_block_truncate_page+0x40/0x40 [ 360.962824][T15975] ? invalidate_inode_pages2_range+0x6cc/0x720 [ 360.969034][T15975] fat_direct_IO+0x110/0x1d0 [ 360.973668][T15975] generic_file_direct_write+0xab/0x1f0 [ 360.979519][T15975] ? mnt_put_write_access_file+0x95/0xb0 [ 360.985345][T15975] __generic_file_write_iter+0xae/0x120 [ 360.991163][T15975] generic_file_write_iter+0x7d/0x1c0 [ 360.996581][T15975] do_iter_write+0x4ad/0x770 [ 361.001352][T15975] ? iter_file_splice_write+0xeb/0x7e0 [ 361.006862][T15975] vfs_iter_write+0x56/0x70 [ 361.011414][T15975] iter_file_splice_write+0x462/0x7e0 [ 361.016979][T15975] ? splice_from_pipe+0xe0/0xe0 [ 361.021891][T15975] direct_splice_actor+0x8a/0xb0 [ 361.027068][T15975] splice_direct_to_actor+0x31d/0x690 [ 361.032569][T15975] ? direct_file_splice_eof+0x70/0x70 [ 361.038011][T15975] do_splice_direct+0x10d/0x190 [ 361.042912][T15975] ? do_splice_direct+0x190/0x190 [ 361.048014][T15975] do_sendfile+0x3c4/0x980 [ 361.052464][T15975] __x64_sys_sendfile64+0x110/0x150 [ 361.057691][T15975] do_syscall_64+0x44/0x110 [ 361.062229][T15975] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 361.068247][T15975] RIP: 0033:0x7f8517f84ae9 [ 361.072703][T15975] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 361.092496][T15975] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 361.101050][T15975] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 361.109239][T15975] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 361.117274][T15975] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 361.125272][T15975] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 361.133263][T15975] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 361.141272][T15975] [ 361.561294][T15959] syz-executor.0 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 361.572711][T15959] CPU: 1 PID: 15959 Comm: syz-executor.0 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 361.582871][T15959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 361.592939][T15959] Call Trace: [ 361.596488][T15959] [ 361.599443][T15959] dump_stack_lvl+0xda/0x130 [ 361.604050][T15959] dump_stack+0x15/0x20 [ 361.608287][T15959] dump_header+0x82/0x2d0 [ 361.612727][T15959] oom_kill_process+0x33a/0x4c0 [ 361.617677][T15959] out_of_memory+0x9ca/0xbf0 [ 361.622305][T15959] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 361.628391][T15959] mem_cgroup_out_of_memory+0x139/0x190 [ 361.634048][T15959] try_charge_memcg+0x75c/0xd30 [ 361.639121][T15959] ? __swap_duplicate+0x29b/0x2b0 [ 361.644228][T15959] ? radix_tree_lookup+0xf9/0x150 [ 361.649273][T15959] mem_cgroup_swapin_charge_folio+0x107/0x190 [ 361.655449][T15959] __read_swap_cache_async+0x2f6/0x550 [ 361.661017][T15959] swap_cluster_readahead+0x27c/0x4c0 [ 361.666468][T15959] swapin_readahead+0xe9/0x7f0 [ 361.671377][T15959] ? __filemap_get_folio+0x41a/0x5a0 [ 361.676770][T15959] ? __perf_event_task_sched_in+0x769/0x790 [ 361.682704][T15959] ? swap_cache_get_folio+0x6e/0x200 [ 361.688134][T15959] do_swap_page+0x4a0/0x1670 [ 361.692776][T15959] ? __rcu_read_lock+0x35/0x50 [ 361.697635][T15959] ? pte_offset_map_nolock+0x124/0x1d0 [ 361.703147][T15959] handle_mm_fault+0xa36/0x2dd0 [ 361.708341][T15959] ? mt_find+0x1d9/0x310 [ 361.712694][T15959] exc_page_fault+0x2f7/0x6c0 [ 361.717456][T15959] asm_exc_page_fault+0x26/0x30 [ 361.722353][T15959] RIP: 0010:__get_user_8+0x11/0x20 [ 361.727627][T15959] Code: 48 c1 fa 3f 48 09 d0 0f 01 cb 8b 10 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 89 c2 48 c1 fa 3f 48 09 d0 0f 01 cb <48> 8b 10 31 c0 0f 01 ca c3 66 0f 1f 44 00 00 f3 0f 1e fa 0f 01 cb [ 361.747320][T15959] RSP: 0018:ffffc90000adfe38 EFLAGS: 00050202 [ 361.753391][T15959] RAX: 0000555556682da8 RBX: ffffc90000adfe40 RCX: ffffffff81443343 [ 361.761436][T15959] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88813c5c09d0 [ 361.769412][T15959] RBP: ffffc90000adfef8 R08: 000188813c5c09d7 R09: 0000000000000000 [ 361.777400][T15959] R10: 0001ffffffffffff R11: 000188813c5c0690 R12: ffff88813c5c0000 [ 361.785445][T15959] R13: ffff88813c5c09d0 R14: ffffc90000adff58 R15: ffffc90000adffd8 [ 361.793528][T15959] ? __rseq_handle_notify_resume+0xb3/0xbf0 [ 361.799796][T15959] __rseq_handle_notify_resume+0xc7/0xbf0 [ 361.805719][T15959] ? mem_cgroup_handle_over_high+0x2c/0x1b0 [ 361.811779][T15959] exit_to_user_mode_loop+0xcc/0xe0 [ 361.816996][T15959] exit_to_user_mode_prepare+0x6c/0xb0 [ 361.822594][T15959] irqentry_exit_to_user_mode+0x9/0x20 [ 361.828170][T15959] irqentry_exit+0x12/0x40 [ 361.832611][T15959] asm_exc_page_fault+0x26/0x30 [ 361.837515][T15959] RIP: 0033:0x7fa99619bea3 [ 361.841950][T15959] Code: 00 00 00 00 00 66 90 31 c0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 <80> 3d 4e 40 0d 00 00 74 14 b8 e6 00 00 00 0f 05 f7 d8 c3 66 2e 0f [ 361.861674][T15959] RSP: 002b:00007ffec50c71d8 EFLAGS: 00010293 [ 361.867863][T15959] RAX: 00000000fffffffa RBX: 00007fa99628ff80 RCX: 0000000000000000 [ 361.876116][T15959] RDX: 00007ffec50c71f0 RSI: 0000000000000000 RDI: 0000000000000000 [ 361.884125][T15959] RBP: 00007fa996291980 R08: 0000000000000010 R09: 00007ffec51e00b0 [ 361.892109][T15959] R10: 0000000000000000 R11: 0000000000010f4c R12: 000000000005843e [ 361.900217][T15959] R13: ffffffffffffffff R14: 00007fa995cf4000 R15: 00000000000580fd [ 361.908198][T15959] [ 361.911700][T15959] memory: usage 307200kB, limit 307200kB, failcnt 148 [ 361.918610][T15959] memory+swap: usage 307440kB, limit 9007199254740988kB, failcnt 0 [ 361.926560][T15959] kmem: usage 307184kB, limit 9007199254740988kB, failcnt 0 [ 361.933953][T15959] Memory cgroup stats for /syz0: [ 361.934130][T15959] cache 8192 [ 361.942632][T15959] rss 8192 [ 361.945656][T15959] shmem 0 [ 361.948621][T15959] mapped_file 0 [ 361.952264][T15959] dirty 0 [ 361.955222][T15959] writeback 4096 [ 361.958837][T15959] workingset_refault_anon 28 [ 361.963520][T15959] workingset_refault_file 8 [ 361.968260][T15959] swap 245760 [ 361.971553][T15959] swapcached 8192 [ 361.975264][T15959] pgpgin 50665 [ 361.978695][T15959] pgpgout 50661 [ 361.982162][T15959] pgfault 76504 [ 361.985640][T15959] pgmajfault 13 [ 361.989141][T15959] inactive_anon 0 [ 361.992795][T15959] active_anon 0 [ 361.996388][T15959] inactive_file 8192 [ 362.000302][T15959] active_file 0 [ 362.003799][T15959] unevictable 0 [ 362.007279][T15959] hierarchical_memory_limit 314572800 [ 362.012652][T15959] hierarchical_memsw_limit 9223372036854771712 [ 362.019202][T15959] total_cache 8192 [ 362.023000][T15959] total_rss 8192 [ 362.026584][T15959] total_shmem 0 [ 362.030054][T15959] total_mapped_file 0 [ 362.034239][T15959] total_dirty 0 [ 362.037732][T15959] total_writeback 4096 [ 362.041831][T15959] total_workingset_refault_anon 28 [ 362.047123][T15959] total_workingset_refault_file 8 [ 362.052163][T15959] total_swap 245760 [ 362.055964][T15959] total_swapcached 8192 [ 362.060149][T15959] total_pgpgin 50665 [ 362.064068][T15959] total_pgpgout 50661 [ 362.068229][T15959] total_pgfault 76504 [ 362.072284][T15959] total_pgmajfault 13 [ 362.076304][T15959] total_inactive_anon 0 [ 362.080487][T15959] total_active_anon 0 [ 362.084543][T15959] total_inactive_file 8192 [ 362.088999][T15959] total_active_file 0 [ 362.093060][T15959] total_unevictable 0 [ 362.097070][T15959] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=15959,uid=0 [ 362.112615][T15959] Memory cgroup out of memory: Killed process 15959 (syz-executor.0) total-vm:46296kB, anon-rss:380kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 04:59:13 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x672040, 0x0) 04:59:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)={0x3f8, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}, @nested={0xd9, 0x0, 0x0, 0x1, [@generic="a21fa5e4d3ff2a482e149ec29020", @generic="1a702e2b7ded89c364ccff1e8faf4578cfe46cac3ba5fd67683579eb81a7290829c93502a53b33b6b6c3e02f2243073d826ede7ad943e319284caf1d6417647a835f25c8717b5d5963804377d81b0b64ca919b5ec7ab81abd2", @generic="a4ef9641ea194f2b19e0f4544ac4c6a444518e3523053894f309ff01ad9d0e9d62db13fc1fe4c74dd449b936934eed3bfa203d28857573b23412dda6bd1fa6fe81a5e559da683986053335b8aae955fdea758e90c1da2341fa97eefc4747c7142da7b904d52477fd5fcb0b57bf49"]}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @nested={0xfd, 0x0, 0x0, 0x1, [@generic="5eedd553b09f965c1bd9e8481327e9e495827ba126a098acf66355e2cb6e0b72c823e48bca04273ab0c10e8ef1ebc5bb17b3dcf332803c9b0c26a2", @generic="bac9fa568608c56cc3e077b2d708230b653041438037410a55e0ee89c7a38a8009e459f1013fb14b075c2baaf917bb3efdd16598cbda77df0d8dcf0694517bdfc2246f45be7707ea729a1da700ba075c7710199435d1295b4abd9ff169105b5a67c935abec75c39a62fd58ef87ed3fdd67f3d154420b6bcc3e97f070ecfd80b51d1960b7205c88c7903b31e8fb8167dc314960868b2f7950fd6bcd976b734f0c83af7db44085f0177b6f89f08ce6efa08edd08f02154", @typed={0x8, 0x0, 0x0, 0x0, @fd}]}, @nested={0x110, 0x0, 0x0, 0x1, [@typed={0x4}, @typed={0x4}, @typed={0xdd, 0x0, 0x0, 0x0, @binary="1c075eff39fc95c01b93633fb73e5f76d0694fc6b960f48fd961af3ab3eeb30fd29e1ecb74796b1899cbbc3588a89783db1f0bfceff448115347c379390aab91b9e3153b10f0ece88030b3a89cc3e33471be20573f3bd83c0fabc9283879344d2a84a616e69ac350ef46f988c5c96be446a35eaa6aa96f4d70355ddaf5b81c6ea852d05d8905a7b79d73e1df674ac8efd6b2a1f8eda5d71a649d5535ffc1a16b75fdaa914ce090538210fb43bc5d39461c82ef7c1902105e7ca79417f349aa9e495e06c29f8c426d1a131670c55e22c870d3e47244149eb689"}, @typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}, @nested={0xe5, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="0da59d09d17e7edd11e7ef5905361cc0066df79636896ea0db22afcbe77b9190e2d09fdc709d4874ad0f9197f9b25443102b5b74cb063fd7ee629ac0721a46648cb8b1001dbecd3368ff08e7da749bf6a32432bfe126234474c3433583e72d7dc32ce1890a974d6a773fa2487daea1100eff", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @generic="32434a78248376c0d15b0d7b2abb3e8588e0472a5466786779c0e9cb35aa4f4858c0e08aa4a21c45f9d04318078603244cabd6a94ca48159f58b7b44f4523f34415515d17aef2273eaf8730eb500d3d318e10d5e", @generic="79d1a8"]}]}, 0x3f8}, {&(0x7f0000000780)={0x1274, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x1261, 0x0, 0x0, 0x1, [@generic="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", @typed={0x4}, @generic="71a0d9a325680b291c44cc6318605826b9c187fd9ea9f2289f1fcf9767db673566a9b9d519641e34c8fa4020c786f315a416e55888dc72ef329c1ea69f48e46ce0c81e6e028293ed3632144947743e85a7335d8d512b5771f42f7fd17386842cb4ea09ff3f3ec6cf0b0a6644817295ffe76214351d35512c54f7eb447b824663938202723bbc304cb7078696be180a814b8f", @generic="c257e341375ffbf8b2fc46110991940646f4c37605f7741ca59cf3e61d4caf7cfe8e1a32e443c108f5ace89672ad126ddf871a6fbe34cdb27a398ac977e2c21b07312530dafa34a9f485d7621f519d9ca3aa44c945bd0fee072da631f2c8374ad08d2ecc2ac7443133ee057d5878e8925b24cf63547c24591ce7ca91e9ec456bbaa7c793884cf392781c2ee666594752845c9ac079730533ecbbe4bb730d557c9228f8653b2e07cfca7e51d3227cf51069cbc2f9397afc381d504f1c7d7103d6e91abc4b97dca2f51e5660d03163a0a80e9fe915e898865309f1622da3da4bc86e8475398ffc", @generic="aa9660edd146a61a8ae90b0308def78d407d294c7570a3b2c71eaeed56d8c01e21c82f15abc5b4b922c3cc876f1310a1ed49271ebb87c2edbf5bd0bde195c62d6a4e41124019517e2daead0c7308e192b9b8b5371262cd0bbb85018925c4a31b75e085936c0aad5721190e343c9859d08b0dca5c0d312905e923b9faefb032bfab7ce419d716513373d45747", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="a63d511189854558fbef73310d618d1441b1b6be7029625776dcc09b7ca7bf5776c4522df2a015c5b2a90e2fe25b544aa392ff8f9db0c2f0f62097", @generic="370018fbf4034e441022582f01499a373f09"]}]}, 0x1274}, {&(0x7f0000001a00)={0x818, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc5, 0x0, 0x0, 0x1, [@generic="379e4dfea3c9fb8da2fdf10c2b16f34b59e29995cda234311efac589bccb65360162085c2c51b156485d4ea2aa81a69850ef8a28f64d3bb7aa4d1efd57728d871fe4ddae9dc1703fa853cc053b62516d2f344a55169c175bf113771ec95f28b16f0c55ceb2919930c95315df4da5b99b09fda8f9067fffa9c0afed80760dd543e0ee0acb9d4b527953de82fddd783036dbe6459660e865aa988b17db522bd2d151a0bdeb175b541fae279028aa74e91ebaf6861cf81d6e3d9b3c6954b2bfa8c6c7"]}, @generic="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"]}, 0x818}], 0x3}, 0x0) 04:59:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x29, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:13 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, 0x0, 0x0) 04:59:13 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 04:59:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 72) 04:59:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x31, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:13 executing program 4: socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./bus\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="080309fcc1f74802010e0200c52cf7c21175e005b02f0800eb2b2ff0dac8897c6b112002faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 04:59:13 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x7ffffffff000) 04:59:13 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000180)=[@register_looper={0x630c}], 0x0, 0x0, 0x0}) [ 362.376933][T15992] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15992 comm=syz-executor.3 [ 362.389831][T15992] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15992 comm=syz-executor.3 [ 362.402779][T15992] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15992 comm=syz-executor.3 04:59:13 executing program 5: r0 = socket(0x11, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) 04:59:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000000)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000100)=0x6) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x2b) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setresuid(0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000380)=[{{&(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000a00), 0x0, &(0x7f0000000940)=ANY=[@ANYRES8=r2, @ANYRES32, @ANYRES16=r0, @ANYRES32, @ANYRES32, @ANYBLOB="00bfd61825210f91fdc12703772cdbb9e35f6f1288943cb564d56d3d051a8640d86e7287216f7f13089ff703b57a720df23eedd195bc9f43248a480a12c38486d7375c417d008092871326f9e39a04c14e43ab1524686eed805f1498fe2cde71fafe8a3ae5461f65aa45c2fc30da3a28d0e49d30d79978605078417425a828ddb5ba1714cdd09cb90de7a2c502902c845ed5251aa9459cd9ae419148c9dc", @ANYRESHEX=r0, @ANYRES32, @ANYRES32, @ANYBLOB="00000196f5cfc900000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRESHEX=r2, @ANYRES32=r1, @ANYRES32=r2, @ANYRES8=r1, @ANYBLOB="1c000053c9e925dd6600"/24, @ANYRES8=r2, @ANYRES16, @ANYRESHEX=r0, @ANYBLOB="b7499f6c755d670c48344ac803f2a8f297152af84eefa010269c111efd09ce008c7193e2b957dfe7593e8a86b6a7b46153ede0f19762c0e6641da1f295be589db5036d7f1f263a5f5e58d4b6230d1cb825ea397d33f95e676ecadfd33bb264ee0907b8e0af2a7f88200c0adae0f33ae25e8dfe3d6401424fac8732a6978ba99b98bfb8c9f965493a47a21c1151d6ed5032dc82c6489724a2ae9a69c33b0261f35a54aa58c9c7b7d0ab729991dda14372d6efae372a64b7937b756340802fafefa7bcbba55924a2d306f61ca3e649adbb06afd2198f93c233604261c798e5dc6130719a30ba85f47ebe6cffca3430f575483de552", @ANYRESOCT=r0, @ANYRESOCT, @ANYRES32, @ANYRES64], 0xa8, 0xc0c4}}], 0x1, 0x4000800) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000040)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) 04:59:13 executing program 0: openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x41}, 0x18) openat2$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x8}, 0x18) [ 362.452661][T15987] loop1: detected capacity change from 0 to 2048 04:59:13 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@pointer, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 04:59:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 04:59:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {}, {0x3, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 04:59:13 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="f8"], 0xf8}, 0x1, 0x0, 0x0, 0x2000c000}, 0x20004000) [ 362.616889][T16017] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16017 comm=syz-executor.3 [ 362.638400][T16018] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 362.650229][T16018] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 04:59:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 73) 04:59:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x541b, 0x0) 04:59:13 executing program 3: open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = socket$inet6(0xa, 0x1, 0x0) close(r1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r1, r2, 0x0, 0xffffdffa) 04:59:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @private0}}) 04:59:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000580)={'ip6tnl0\x00', &(0x7f0000000900)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}}) 04:59:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8907, 0x0) [ 363.128292][T15987] syz-executor.1: attempt to access beyond end of device [ 363.128292][T15987] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 363.193125][T16026] loop1: detected capacity change from 0 to 2048 04:59:14 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x8, 0x2, &(0x7f0000000200)=[@increfs], 0x0, 0x0, 0x0}) 04:59:14 executing program 0: syz_io_uring_setup(0x7a79, &(0x7f0000000040)={0x0, 0x0, 0x100}, &(0x7f00000000c0), &(0x7f0000000100)) 04:59:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1) ioctl$TUNSETPERSIST(r0, 0x400454cd, 0x0) 04:59:14 executing program 5: r0 = socket(0x11, 0x2, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 04:59:14 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x7ffff000}}, 0x0) 04:59:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0x0, 0x3, 0x3, 0x0, 0x1}, 0x48) [ 363.399673][T16033] tun0: tun_chr_ioctl cmd 1074025677 [ 363.416740][T16033] tun0: linktype set to 0 04:59:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 04:59:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8911, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 04:59:14 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000200)=[@increfs={0x40086310}], 0x0, 0x0, 0x0}) 04:59:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x17, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}]}, 0x18}}, 0x0) 04:59:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 74) 04:59:14 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40086602, &(0x7f00000003c0)={0x60, 0x0, &(0x7f0000000180)=[@release, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, @free_buffer, @decrefs], 0x0, 0x0, 0x0}) 04:59:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8982, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:14 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5420, 0x0) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) [ 363.592514][T16026] syz-executor.1: attempt to access beyond end of device [ 363.592514][T16026] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:14 executing program 5: socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./bus\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="0803092cc1f74802010e0200c52cf7c21175e005b02f0800eb2b2ff0dac8897c6b112002faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 04:59:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x3, 0x5}, 0x14}}, 0x0) 04:59:14 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000900)={0x44, 0x0, &(0x7f0000000780)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x10, 0x0, &(0x7f0000000400)=[@request_death], 0x0, 0x0, 0x0}) 04:59:14 executing program 0: r0 = socket(0x840000000002, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x10200, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{0x0}], 0x1) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r5, r6, 0x0, 0xffffdffa) syz_open_dev$vcsu(0x0, 0x4, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) 04:59:14 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8948, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:14 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0}) 04:59:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) [ 363.720311][T16060] loop1: detected capacity change from 0 to 2048 04:59:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 75) 04:59:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000500)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@empty}, {@in=@multicast1}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xf0}}, 0x0) 04:59:14 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x10200, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r5, r6, 0x0, 0xffffdffa) sendfile(r0, r1, 0x0, 0x8400fffffffa) 04:59:14 executing program 2: fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x2106, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000000080), &(0x7f00000000c0)) 04:59:14 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x164e, 0x1) [ 364.073287][T16060] syz-executor.1: attempt to access beyond end of device [ 364.073287][T16060] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:14 executing program 2: syz_io_uring_setup(0x2106, &(0x7f0000000000)={0x0, 0x0, 0x2}, 0x0, 0x0) 04:59:14 executing program 5: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x41}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) [ 364.151732][T16088] loop1: detected capacity change from 0 to 2048 [ 364.198981][T16088] FAULT_INJECTION: forcing a failure. [ 364.198981][T16088] name failslab, interval 1, probability 0, space 0, times 0 [ 364.211872][T16088] CPU: 1 PID: 16088 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 364.222211][T16088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 364.232351][T16088] Call Trace: [ 364.235744][T16088] [ 364.238775][T16088] dump_stack_lvl+0xda/0x130 [ 364.243501][T16088] dump_stack+0x15/0x20 [ 364.247739][T16088] should_fail_ex+0x21f/0x230 [ 364.252586][T16088] ? iter_file_splice_write+0xeb/0x7e0 [ 364.258130][T16088] __should_failslab+0x92/0xa0 [ 364.263082][T16088] should_failslab+0x9/0x20 [ 364.267644][T16088] __kmem_cache_alloc_node+0x4e/0x210 [ 364.273110][T16088] ? splice_from_pipe+0xe0/0xe0 [ 364.278031][T16088] ? iter_file_splice_write+0xeb/0x7e0 [ 364.283692][T16088] __kmalloc+0x95/0x1a0 [ 364.287965][T16088] iter_file_splice_write+0xeb/0x7e0 [ 364.293593][T16088] ? splice_from_pipe+0xe0/0xe0 [ 364.298520][T16088] direct_splice_actor+0x8a/0xb0 [ 364.303517][T16088] splice_direct_to_actor+0x31d/0x690 [ 364.308998][T16088] ? direct_file_splice_eof+0x70/0x70 [ 364.314459][T16088] do_splice_direct+0x10d/0x190 [ 364.319337][T16088] ? do_splice_direct+0x190/0x190 [ 364.324541][T16088] do_sendfile+0x3c4/0x980 [ 364.329152][T16088] __x64_sys_sendfile64+0x110/0x150 [ 364.334376][T16088] do_syscall_64+0x44/0x110 [ 364.338904][T16088] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 364.344830][T16088] RIP: 0033:0x7f8517f84ae9 [ 364.349430][T16088] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 364.369328][T16088] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 364.378234][T16088] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 364.387106][T16088] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 364.395384][T16088] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 364.403767][T16088] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 364.411786][T16088] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 364.419959][T16088] 04:59:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f0000000240)) ptrace$peeksig(0x4209, r0, &(0x7f0000000280)={0x0, 0x0, 0x1}, &(0x7f0000000780)=[{}]) syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, @private0, @mcast2={0xff, 0x3}, 0x0, 0x0, 0xfffffffe}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0}) fcntl$notify(r2, 0x402, 0x0) 04:59:15 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000240)) syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x9) r3 = socket(0x10, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2={0xff, 0x3}, 0x0, 0x0, 0x0, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0}) fcntl$notify(r2, 0x402, 0x6) 04:59:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 76) 04:59:15 executing program 0: r0 = socket(0x840000000002, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x10200, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{0x0}], 0x1) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r5, r6, 0x0, 0xffffdffa) syz_open_dev$vcsu(0x0, 0x4, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) 04:59:15 executing program 4: r0 = socket(0x840000000002, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x10200, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{0x0}], 0x1) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r5, r6, 0x0, 0xffffdffa) syz_open_dev$vcsu(0x0, 0x4, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) [ 364.608421][T16101] loop1: detected capacity change from 0 to 2048 04:59:15 executing program 4: r0 = socket(0x840000000002, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x10200, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{0x0}], 0x1) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r5, r6, 0x0, 0xffffdffa) syz_open_dev$vcsu(0x0, 0x4, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) 04:59:15 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x10200, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r5, r6, 0x0, 0xffffdffa) sendfile(r0, r1, 0x0, 0x8400fffffffa) 04:59:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 77) [ 365.346142][T16101] syz-executor.1: attempt to access beyond end of device [ 365.346142][T16101] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8983, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:16 executing program 5: openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x41}, 0xff4) [ 365.399327][T16136] loop1: detected capacity change from 0 to 2048 04:59:16 executing program 0: r0 = socket(0x840000000002, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x10200, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{0x0}], 0x1) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r5, r6, 0x0, 0xffffdffa) syz_open_dev$vcsu(0x0, 0x4, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) 04:59:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={0x0}}, 0x0) 04:59:16 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 04:59:16 executing program 5: r0 = socket(0x10, 0x3, 0x6) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) 04:59:16 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) pipe2(&(0x7f0000000400), 0x0) 04:59:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 04:59:16 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x7ffffffff000}, 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 365.551516][ T27] audit: type=1400 audit(1699678756.325:386): avc: denied { read } for pid=16147 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 365.842324][T16136] syz-executor.1: attempt to access beyond end of device [ 365.842324][T16136] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:16 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2, 0x17, 0x0, 0x0, 0x2}, 0x37fe0}}, 0x0) 04:59:16 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x8, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="bb"], 0x0, 0x0, 0x0}) 04:59:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 78) 04:59:16 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x10200, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r5, r6, 0x0, 0xffffdffa) sendfile(r0, r1, 0x0, 0x8400fffffffa) 04:59:16 executing program 4: r0 = socket(0x840000000002, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x10200, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{0x0}], 0x1) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r5, r6, 0x0, 0xffffdffa) syz_open_dev$vcsu(0x0, 0x4, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) [ 366.048781][T16168] loop1: detected capacity change from 0 to 2048 [ 366.082445][T16168] FAULT_INJECTION: forcing a failure. [ 366.082445][T16168] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 366.095851][T16168] CPU: 0 PID: 16168 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 366.106137][T16168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 366.116408][T16168] Call Trace: [ 366.119782][T16168] [ 366.122852][T16168] dump_stack_lvl+0xda/0x130 [ 366.127814][T16168] dump_stack+0x15/0x20 [ 366.132214][T16168] should_fail_ex+0x21f/0x230 [ 366.137218][T16168] __should_fail_alloc_page+0xfd/0x110 [ 366.142744][T16168] __alloc_pages+0x108/0x340 [ 366.147498][T16168] alloc_pages_mpol+0xb1/0x1d0 [ 366.152396][T16168] folio_alloc+0xea/0x120 [ 366.156826][T16168] filemap_alloc_folio+0x68/0x220 [ 366.161924][T16168] __filemap_get_folio+0x298/0x5a0 [ 366.167102][T16168] ? invalidate_inode_pages2_range+0x6cc/0x720 [ 366.173477][T16168] pagecache_get_page+0x2a/0x90 [ 366.178488][T16168] ? fat_block_truncate_page+0x40/0x40 [ 366.184181][T16168] grab_cache_page_write_begin+0x2e/0x40 [ 366.189863][T16168] block_write_begin+0x31/0x170 [ 366.194824][T16168] cont_write_begin+0x479/0x690 [ 366.199708][T16168] fat_write_begin+0x61/0xf0 [ 366.204382][T16168] ? fat_block_truncate_page+0x40/0x40 [ 366.210048][T16168] generic_perform_write+0x1c9/0x410 [ 366.215406][T16168] ? generic_file_direct_write+0x1dc/0x1f0 [ 366.221339][T16168] __generic_file_write_iter+0xec/0x120 [ 366.226984][T16168] generic_file_write_iter+0x7d/0x1c0 [ 366.232730][T16168] do_iter_write+0x4ad/0x770 [ 366.237390][T16168] ? iter_file_splice_write+0xeb/0x7e0 [ 366.242991][T16168] vfs_iter_write+0x56/0x70 [ 366.247536][T16168] iter_file_splice_write+0x462/0x7e0 [ 366.253117][T16168] ? splice_from_pipe+0xe0/0xe0 [ 366.258048][T16168] direct_splice_actor+0x8a/0xb0 [ 366.263262][T16168] splice_direct_to_actor+0x31d/0x690 [ 366.268679][T16168] ? direct_file_splice_eof+0x70/0x70 [ 366.274083][T16168] do_splice_direct+0x10d/0x190 [ 366.279093][T16168] ? do_splice_direct+0x190/0x190 [ 366.284503][T16168] do_sendfile+0x3c4/0x980 [ 366.289146][T16168] __x64_sys_sendfile64+0x110/0x150 [ 366.294475][T16168] do_syscall_64+0x44/0x110 [ 366.299046][T16168] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 366.305171][T16168] RIP: 0033:0x7f8517f84ae9 [ 366.309807][T16168] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 366.329995][T16168] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 366.338548][T16168] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 04:59:17 executing program 0: r0 = socket(0x840000000002, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x10200, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddb", @ANYBLOB], 0x34}}, 0x800) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{0x0}], 0x1) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r5, r6, 0x0, 0xffffdffa) syz_open_dev$vcsu(0x0, 0x4, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) 04:59:17 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x401c5820, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000200)=[@increfs], 0x0, 0x0, 0x0}) 04:59:17 executing program 2: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)={0x200, 0x0, 0x34}, 0x18) 04:59:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 79) [ 366.346596][T16168] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 366.354644][T16168] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 366.362938][T16168] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 366.371287][T16168] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 366.379307][T16168] 04:59:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4108}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 04:59:17 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@pointer, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:59:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x401, 0x2, 0x1}, 0x48) [ 366.480422][T16175] loop1: detected capacity change from 0 to 2048 [ 366.850149][T16175] syz-executor.1: attempt to access beyond end of device [ 366.850149][T16175] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:17 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[], 0xf8}}, 0x0) 04:59:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x40086602, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:17 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x10200, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet6(0xa, 0x1, 0x0) close(r5) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r5, r6, 0x0, 0xffffdffa) sendfile(r0, r1, 0x0, 0x8400fffffffa) 04:59:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 80) 04:59:17 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 366.934969][T16192] loop1: detected capacity change from 0 to 2048 04:59:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89a3, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4107}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 04:59:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @local}}) [ 367.283190][T16192] syz-executor.1: attempt to access beyond end of device [ 367.283190][T16192] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 81) 04:59:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[], 0x70}, 0x300}, 0x0) 04:59:18 executing program 2: r0 = socket(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x10200, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x800) open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = socket$inet6(0xa, 0x1, 0x0) close(r3) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r3, r4, 0x0, 0xffffdffa) 04:59:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x30, 0x3, 0x3, 0x301, 0x0, 0x0, {}, [@NFQA_MARK={0x8}, @NFQA_VERDICT_HDR={0xc}, @NFQA_MARK={0x8}]}, 0x30}}, 0x0) 04:59:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x9, 0x0, &(0x7f00000000c0)='syzkaller\x00'}, 0x90) 04:59:18 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000140)=0xffffffff, 0x4) 04:59:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8927, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000340), 0x4) 04:59:18 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b1424"], 0x0, 0x0, 0x0}) [ 367.430933][T16204] loop1: detected capacity change from 0 to 2048 [ 367.464180][T16220] tipc: Trying to set illegal importance in message 04:59:18 executing program 4: socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./bus\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$packet(0x11, 0x2, 0x300) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:59:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f0000000240)) ptrace$peeksig(0x4209, r0, &(0x7f0000000280), &(0x7f0000000780)) syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2={0xff, 0x3}, 0x0, 0x0, 0xfffffffe, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0}) fcntl$notify(0xffffffffffffffff, 0x402, 0x6) 04:59:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0xa}, 0x0) 04:59:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 82) 04:59:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891f, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:18 executing program 4: socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./bus\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$packet(0x11, 0x2, 0x300) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:59:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x401c5820, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5452, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:18 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000200)=[@increfs={0x40406301}], 0x0, 0x0, 0x0}) 04:59:18 executing program 4: socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./bus\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$packet(0x11, 0x2, 0x300) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:59:18 executing program 5: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2, 0x17, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 04:59:18 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, 0x0) [ 367.824926][T16204] syz-executor.1: attempt to access beyond end of device [ 367.824926][T16204] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:18 executing program 0: openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0xfffffe98) 04:59:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x508, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x31}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568) 04:59:18 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x41}, 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v2={0x2, @adiantum, 0x0, '\x00', @d}) [ 367.947251][T16252] loop1: detected capacity change from 0 to 2048 04:59:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5}, 0x90) 04:59:19 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, 0x0) 04:59:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891e, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:19 executing program 4: socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./bus\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$packet(0x11, 0x2, 0x300) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:59:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 83) 04:59:19 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x41}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000000)={@desc={0x1, 0x0, @desc2}}) 04:59:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8970, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) [ 368.203751][T16252] syz-executor.1: attempt to access beyond end of device [ 368.203751][T16252] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:19 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, 0x0) 04:59:19 executing program 2: r0 = socket(0x2, 0x3, 0x7) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000ac0)={&(0x7f0000000900), 0xc, &(0x7f0000000a00)={0x0}}, 0x0) 04:59:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='T'], 0x54}, 0x1, 0x0, 0x0, 0x4000080}, 0x200000c4) 04:59:19 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 04:59:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8983, 0x0) 04:59:19 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, 0x0) 04:59:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f00000001c0)=0x4, 0x4) 04:59:19 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x5c, 0x0, &(0x7f0000000200)=[@request_death, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 04:59:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000580)={'ip6tnl0\x00', &(0x7f0000000900)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}}) [ 368.302005][T16269] loop1: detected capacity change from 0 to 2048 [ 368.313521][T16281] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=16281 comm=syz-executor.4 04:59:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 84) 04:59:19 executing program 4: getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) 04:59:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x2}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 04:59:19 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x68}}, 0x0) 04:59:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x15, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2}, @sadb_key={0x1, 0x8}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x50}}, 0x0) 04:59:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f0000000240)) ptrace$peeksig(0x4209, r0, &(0x7f0000000280)={0x0, 0x0, 0x1}, &(0x7f0000000780)=[{}]) syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2={0xff, 0x3}, 0x0, 0x0, 0xfffffffe, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0}) fcntl$notify(r2, 0x402, 0x6) 04:59:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f1, &(0x7f0000000580)={'ip6tnl0\x00', 0x0}) 04:59:19 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1c00, 0x1) [ 368.636826][T16269] syz-executor.1: attempt to access beyond end of device [ 368.636826][T16269] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:19 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, &(0x7f0000000080)) 04:59:19 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000200)=[@increfs], 0x0, 0x0, 0x0}) 04:59:19 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0xffffffff00000000}, 0x0) 04:59:19 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, &(0x7f0000000080)) [ 368.717014][T16304] loop1: detected capacity change from 0 to 2048 04:59:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 85) 04:59:19 executing program 0: r0 = socket(0x840000000002, 0x3, 0x100) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x10200, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000006600080028bd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="2eb40d010000080016bae018ff4b"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = socket$inet6(0xa, 0x1, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r4, r5, 0x0, 0xffffdffa) syz_open_dev$vcsu(&(0x7f0000000500), 0x4, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) 04:59:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x6, 0x4) 04:59:19 executing program 4: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x84, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}]}, 0x84}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x70}, 0x8}, 0x0) 04:59:19 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, &(0x7f0000000080)) [ 369.083729][T16304] syz-executor.1: attempt to access beyond end of device [ 369.083729][T16304] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 369.237958][T16329] loop1: detected capacity change from 0 to 2048 [ 369.265262][T16329] FAULT_INJECTION: forcing a failure. [ 369.265262][T16329] name failslab, interval 1, probability 0, space 0, times 0 [ 369.278011][T16329] CPU: 0 PID: 16329 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 369.288124][T16329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 369.298210][T16329] Call Trace: [ 369.301516][T16329] [ 369.304459][T16329] dump_stack_lvl+0xda/0x130 [ 369.309168][T16329] dump_stack+0x15/0x20 [ 369.313678][T16329] should_fail_ex+0x21f/0x230 [ 369.318497][T16329] ? iter_file_splice_write+0xeb/0x7e0 [ 369.324200][T16329] __should_failslab+0x92/0xa0 [ 369.329292][T16329] should_failslab+0x9/0x20 [ 369.334337][T16329] __kmem_cache_alloc_node+0x4e/0x210 [ 369.340444][T16329] ? splice_from_pipe+0xe0/0xe0 [ 369.345535][T16329] ? iter_file_splice_write+0xeb/0x7e0 [ 369.351251][T16329] __kmalloc+0x95/0x1a0 [ 369.355562][T16329] iter_file_splice_write+0xeb/0x7e0 [ 369.360918][T16329] ? splice_from_pipe+0xe0/0xe0 [ 369.365818][T16329] direct_splice_actor+0x8a/0xb0 [ 369.370814][T16329] splice_direct_to_actor+0x31d/0x690 [ 369.376311][T16329] ? direct_file_splice_eof+0x70/0x70 [ 369.381802][T16329] do_splice_direct+0x10d/0x190 [ 369.386811][T16329] ? do_splice_direct+0x190/0x190 [ 369.392054][T16329] do_sendfile+0x3c4/0x980 [ 369.396524][T16329] __x64_sys_sendfile64+0x110/0x150 [ 369.401932][T16329] do_syscall_64+0x44/0x110 [ 369.406545][T16329] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 369.412664][T16329] RIP: 0033:0x7f8517f84ae9 [ 369.417103][T16329] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 369.437240][T16329] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 369.445870][T16329] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 369.453878][T16329] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 369.461911][T16329] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 369.470033][T16329] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 369.478168][T16329] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 369.486180][T16329] 04:59:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f0, &(0x7f0000000580)={'ip6tnl0\x00', 0x0}) 04:59:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8930, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:20 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, &(0x7f0000000080)) 04:59:20 executing program 2: syz_io_uring_setup(0xd95, &(0x7f0000000000)={0x0, 0x0, 0x4}, 0x0, 0x0) 04:59:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 86) 04:59:20 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) read$msr(r0, 0x0, 0x0) 04:59:20 executing program 2: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0) 04:59:20 executing program 4: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000240)={0x24a840}, 0x18) [ 369.595633][T16335] loop1: detected capacity change from 0 to 2048 [ 369.631301][T16335] FAULT_INJECTION: forcing a failure. [ 369.631301][T16335] name failslab, interval 1, probability 0, space 0, times 0 [ 369.644195][T16335] CPU: 0 PID: 16335 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 369.654500][T16335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 369.664622][T16335] Call Trace: [ 369.668107][T16335] [ 369.671063][T16335] dump_stack_lvl+0xda/0x130 [ 369.675693][T16335] dump_stack+0x15/0x20 [ 369.679962][T16335] should_fail_ex+0x21f/0x230 [ 369.684705][T16335] ? __blockdev_direct_IO+0x137/0x1f90 [ 369.690311][T16335] __should_failslab+0x92/0xa0 [ 369.695362][T16335] should_failslab+0x9/0x20 [ 369.700013][T16335] kmem_cache_alloc+0x4e/0x250 [ 369.704840][T16335] __blockdev_direct_IO+0x137/0x1f90 [ 369.710188][T16335] ? __rcu_read_unlock+0x4d/0x70 [ 369.715348][T16335] ? find_get_entries+0x397/0x410 [ 369.720443][T16335] ? fat_block_truncate_page+0x40/0x40 [ 369.726334][T16335] ? invalidate_inode_pages2_range+0x6cc/0x720 [ 369.732664][T16335] fat_direct_IO+0x110/0x1d0 [ 369.737496][T16335] generic_file_direct_write+0xab/0x1f0 [ 369.743213][T16335] ? mnt_put_write_access_file+0x95/0xb0 [ 369.748913][T16335] __generic_file_write_iter+0xae/0x120 [ 369.754530][T16335] generic_file_write_iter+0x7d/0x1c0 [ 369.760071][T16335] do_iter_write+0x4ad/0x770 [ 369.764767][T16335] ? iter_file_splice_write+0xeb/0x7e0 [ 369.770432][T16335] vfs_iter_write+0x56/0x70 [ 369.775076][T16335] iter_file_splice_write+0x462/0x7e0 [ 369.780574][T16335] ? splice_from_pipe+0xe0/0xe0 [ 369.785592][T16335] direct_splice_actor+0x8a/0xb0 [ 369.790732][T16335] splice_direct_to_actor+0x31d/0x690 [ 369.796178][T16335] ? direct_file_splice_eof+0x70/0x70 [ 369.801770][T16335] do_splice_direct+0x10d/0x190 [ 369.806908][T16335] ? do_splice_direct+0x190/0x190 [ 369.812063][T16335] do_sendfile+0x3c4/0x980 [ 369.816795][T16335] __x64_sys_sendfile64+0x110/0x150 [ 369.822038][T16335] do_syscall_64+0x44/0x110 [ 369.826614][T16335] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 369.832601][T16335] RIP: 0033:0x7f8517f84ae9 [ 369.837046][T16335] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 369.857040][T16335] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 369.865485][T16335] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 369.873481][T16335] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 369.881508][T16335] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 369.889782][T16335] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 369.897886][T16335] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 369.906017][T16335] 04:59:20 executing program 0: r0 = socket(0x18, 0x0, 0x1) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x4a0}}, 0x0) 04:59:20 executing program 3: syz_io_uring_setup(0x2106, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000000080), &(0x7f00000000c0)) 04:59:20 executing program 5: syz_io_uring_setup(0x79, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) 04:59:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@pointer, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f00000001c0)='GPL\x00'}, 0x90) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)={'syz0', "c7a8f4fe6e4ab1c9319e53f252a5a5e49efcdcc85b97ca25b41790ce09b7d03d8661f48cb8027764cd3f094873c3eb5ad05c594491267c655c98e30fd6cbe87502da39cc79e78dee846f06dfa64448fb19fc850cb18d80fbb3538ebd82f3dd264353ee6cf62a5ba4fca57deafa7be4e4647fb068e4fdfff68694d6467e4a64475a09224795a2cfe2683a04f29229373949b26c5f7aeca387ad5657166bac50a9613f5427e5675db6e7e55bf0f7368d5f319995f36a72bba3f0abb0cbac5d2d3adf9e6dd8104226640c6ba7d6dc52bcf298c7f4c46edd4f4cda1c159fb41e34fcd538d4"}, 0xe7) 04:59:20 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x5452, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:59:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 87) 04:59:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8923, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:20 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, 0x0, 0x59) 04:59:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x2}}, 0x0) 04:59:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x400b}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 04:59:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, 0xffffffffffffffff, 0x0) 04:59:20 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="f8"], 0xf8}}, 0x0) 04:59:20 executing program 4: syz_io_uring_setup(0x204b, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) 04:59:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0xa}, 0x0) 04:59:20 executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 04:59:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x7ffff000}}, 0x0) [ 370.050031][T16353] loop1: detected capacity change from 0 to 2048 04:59:20 executing program 0: syz_io_uring_setup(0x629d, &(0x7f0000000200)={0x0, 0x0, 0x200}, 0x0, 0x0) [ 370.133231][T16377] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16377 comm=syz-executor.5 04:59:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 88) 04:59:21 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x4020940d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:59:21 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x17, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}]}, 0x18}}, 0x0) 04:59:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8902, 0x0) 04:59:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x9) r3 = socket(0x10, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @mcast2={0xff, 0x3}, 0x0, 0x0, 0xfffffffe, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:21 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x0) 04:59:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0x0, 0x3, 0x3, 0x2881, 0x1}, 0x48) 04:59:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:59:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x37fe0}}, 0x0) [ 370.415197][T16353] syz-executor.1: attempt to access beyond end of device [ 370.415197][T16353] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f00000000c0)) 04:59:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x4, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}], &(0x7f0000000300)='syzkaller\x00'}, 0x90) 04:59:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x70}, 0x1, 0x0, 0x2}, 0x0) [ 370.814166][T16408] loop1: detected capacity change from 0 to 2048 04:59:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 89) 04:59:21 executing program 3: select(0x40, &(0x7f00000002c0), 0x0, 0x0, &(0x7f00000005c0)={0x77359400}) 04:59:21 executing program 4: socket(0xa, 0x5, 0x3ff) 04:59:21 executing program 2: r0 = socket(0x2, 0x3, 0x7) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x0) [ 371.121859][T16408] syz-executor.1: attempt to access beyond end of device [ 371.121859][T16408] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 371.189625][T16416] loop1: detected capacity change from 0 to 2048 04:59:22 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000180)=[@register_looper, @release], 0x0, 0x0, 0x0}) 04:59:22 executing program 2: socket(0x840000000002, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x10200, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x46000, 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = socket$inet6(0xa, 0x1, 0x0) close(r2) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r2, r3, 0x0, 0xffffdffa) 04:59:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8971, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @private0}}) 04:59:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f2, &(0x7f0000000580)={'ip6tnl0\x00', 0x0}) 04:59:22 executing program 4: execveat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[0xffffffffffffffff], 0x0, 0x0) 04:59:22 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8943, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:22 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="5ffa45aae963"}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="08031400c1f74802010e0200c52cf7c22c75e005b02f0800eb2b2ff0dac8897c6b112002faffffff3066090cb600c5471d13", 0x32, 0x0, 0x0, 0x0) 04:59:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 90) [ 371.549865][T16416] syz-executor.1: attempt to access beyond end of device [ 371.549865][T16416] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 371.604090][T16436] loop1: detected capacity change from 0 to 2048 [ 371.857342][T16436] syz-executor.1: attempt to access beyond end of device [ 371.857342][T16436] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x401, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) 04:59:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 91) 04:59:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x2, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 04:59:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[], 0x10}}, 0x0) 04:59:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 04:59:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00') r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000340), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000480)=""/63, 0x3f}, {&(0x7f00000004c0)=""/164, 0xa4}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0xc0}, 0x0) sched_setaffinity(0x0, 0xfffffffffffffea1, &(0x7f0000000200)=0x1000000000d) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = getpid() getpgid(r8) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) r9 = syz_open_procfs$namespace(0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003400)={0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000000940)=ANY=[@ANYBLOB="1080090000009d681f500000000000ffff000038626e92a669d5b2d5003ad69dc6cb1cc49747e5c8fc5aff86aab9e2c081aaed478cbd3c879386a1325d3ee75ce98186697964e524974659261fc099c589aeb708b511"], 0x10}], 0x1}, 0x0) ptrace$pokeuser(0x6, 0x0, 0x81, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, 0x0) sendmsg$netlink(r7, &(0x7f0000000840)={&(0x7f00000001c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x80}, 0xc, &(0x7f0000000240)=[{&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x34}], 0x1, &(0x7f0000000c40)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES64, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r6, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYBLOB="000000000100008001000000000000000000", @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="650000009aa5f1c3391676da551c0000000000f9ffffffffffffff0000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYBLOB="fcfc3f6336d2a69e2bb9950fcde71a1d1b6eaebc694c19b457873d162815268793007f1902fbbf8b19b77c8180ffb1445c7e53199d804a28189810f1adcfa1d569e662378f31338144b3faeb9316fd7a97713f43b430a7810df61c970c8f78b1330098f03ec8eee5e63775fba2775b6596d0fecc44162214451acb4eb360eface1a342eaf2d859ec20b90d9b82d92282d845f2ab9d9d1e13fa322dfa30b0ff5c633233ffb797ad3728f9284aa4158e8314ff1cac819357afbc2c310dbc20aa", @ANYRES32=0xee01, @ANYRES32=r2, @ANYBLOB="eeffffff9198f015000800000100000001006dd54b560000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r10, @ANYRESDEC=r4, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6], 0x118, 0xc080}, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000600)=0x5) r11 = gettid() fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff0000000000008067da969e00", @ANYRES32=r11, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRESDEC=r1], 0x40}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) 04:59:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8992, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:22 executing program 3: setgroups(0x4, &(0x7f0000000000)=[0x0, 0x0, 0xee01, 0xee00]) 04:59:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8902, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8946, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 04:59:22 executing program 5: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedd17907001175f37538e486dd6317ce2200003200db5b6861588d0a04884153e2aef57beeff"], 0xfdef) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 04:59:22 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000002880)=ANY=[@ANYBLOB="b700000030000000bca3000000000000240300001afeffff720af0fff80200ff71a4f0ff000000001f030000000000002e040200000000002604fdffffff000a61140800000000001d430000000000007a0a00fe003f001f6114100000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f300020000fe275daf51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d601009393bf52d2105bd901128c7e0ec82701c8204a09eeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39b21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566d674e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b2045024a982f3c48153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f5624e93aca9e560efa826e5d0c4bd26ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b702396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54fa84323afc4c10eff462c8843187f1dd48ef0900000000000000ff0f4000000000f00700e89a56fe8e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963342aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068c5adfcb0d7fd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a896192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf799b37463f000000a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12b92d7ae633d44086b3f03b20d54abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80eba439772bf60a1db18c472dafc5569adc282928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a44434000000000000000000000000000000000000000000000009dd14b38f2f4426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd8f1d04166d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10baa804a707f0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c821c64757f786b79fef54dbe64c67d73943df80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfc9e8c0a0d213c3ffad44d2a376def42e41e9fc3167a257e040fa7cf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0f7a4f9c2f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945b93fb705b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08acb29a74dc36b512e34182084a3a3b2beb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a3d44ca450b1457c64baeaf8d23f30097126ef7586ed63dd92005c79e4a8ab8a94f0b74903580ac987fd637c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddffff070000d0288ec3899f1e3ba0151c4037148fb479de703fd52b6573349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217e9519952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d6a56ad78e52c23541320d8579c5ab42bc261a781fd14126c146a0aac4221839a4b9bbf61e4bba695a41e2109eba8e40c370267c451ffadbd15cafc97a4d3edfdcb9b5729307c6bdaf7b69325fb05fa8a9869de01fdee477d71bf3e36d1d9019edfa27aae24b632f251df210c86a18fae731ecb8b0d48357378caf2b6789509b1bacfd4fa812fc341875cfa5e798bbf59770000000000000000c8a594ea3c3347962d9113b1fecdfad5a8da641053f02e49456f5d21674521e67a5b18ea451eccf69dd6af928d2d68da9304a296c22fdcea26498d26229110b1aade386b113045033a6188d56e675564d8cb8d5b40114b0f5bf15dd64c9ece60b8588ee8777d0ea8f4713b258427c7d90f9e93348e17723ba9ab8ae790f74cc41ae5795d35f3cec40dff485d2802c08611454d9ea784a205bcc07ec26f906f3cf45bb37014ab6f22af6213618e242b283ea9d3f0677ee598232ec06f7170009d92bb7eddd12c378dfd3e74ec056ee83eef666423d934fc5908c9ff98715218a5964f1e00000000426ac9588e27aefe88100000000000003568bbc2f89596ceacbcbd1c76b8096f1848410843b93fd404f535be474f456778b5ef85abb8fc2336abd5ea64a6efea8a5aca0044f57d15e77e34fc5915499b88ae780a7bae4df603bd3c72808cf300440b1b63615b454a161d5fc1d1308f39b3aff5c03eef2e63a013f8a5bf4da6aa1b7d5ec55e8c7a0405fe718e42d4d613f992a0cbc16cb251386acae02f665544c9c02adae5839f1e00006e42fc051a0cb8685667c2edf4522f0f2a8eb7c7b56063a959c4b881e3dbff3c911435e84bc57f36afb8ff78168719dc5ed47eb309f8a12db461beffd0d091a132330579c9afac1a4ad2794987927eb61ad82a61a144d33283eaeda44830a97426b3dc836a684a6e2716d83e60f5e0e1ab6376960224dc96c839a1fef49475cc0e3053eeb4aebd0e1696f20d458f1aac2d2d871221d3a2d0e1790584ba14b9145a3f81298ae7871f0191a740a8e53b0b6f152dc4d8f28eaa2a5acadd2313f55287aa6ea469b90575839cd763b4703e87fbd6bd134c2cb62996c5d28e73df35744f19143c0b57a26d692dd9a5cf3ab615e432e38b0cbbcced5c39a73fc8e50e6590605cc0b7db1dbca3ea6fbcdff0e18fdeeb5360642d77171433e78bd9300fd171fc83700f0e92b116e7846719eecd94331354b35b9aac42b34fac350decfe5c2eac926f0a007cb6e3bda3effb84b4607468aaad19dcf0d54e5f4ed4ade1fca17d39be192a10516fb34eb6cde71136bb2b4ce1306c17744fefc2b884bdfebad173147780d8b0129f194a60ed693540a05e3239785a60d38f43bfc91fd06dc2fc41"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0506617, &(0x7f0000000040)=0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x58, &(0x7f00000005c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000010c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0), &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000bc0), &(0x7f0000000dc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000440)={0xa, 0x2}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000001100)=[{0x4, 0x1, 0x6, 0x8}, {0x1, 0x3, 0x10, 0x5}, {0x4, 0x5, 0x4, 0x8}], 0x10, 0x8}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0xff, 0x8, 0x0, 0x56, 0x0, 0x80000001, 0x40, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10001, 0x2, @perf_config_ext={0x6, 0x9}, 0x200, 0x8000000000000001, 0x56e, 0x9, 0x1, 0x100, 0x6ff, 0x0, 0x9, 0x0, 0x10000}) [ 372.032217][T16442] loop1: detected capacity change from 0 to 2048 04:59:22 executing program 5: ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000040)) sched_rr_get_interval(0x0, &(0x7f0000000500)) 04:59:22 executing program 2: prctl$PR_SET_THP_DISABLE(0x37, 0x0) [ 372.235389][T16463] wireguard0: entered promiscuous mode [ 372.241135][T16463] wireguard0: entered allmulticast mode 04:59:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000000000000002898bbb7c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd78000000008000000000000000"], 0x1, 0x793, &(0x7f0000001700)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x29000) [ 372.774714][T16442] syz-executor.1: attempt to access beyond end of device [ 372.774714][T16442] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00') r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000340), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000480)=""/63, 0x3f}, {&(0x7f00000004c0)=""/164, 0xa4}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0xc0}, 0x0) sched_setaffinity(0x0, 0xfffffffffffffea1, &(0x7f0000000200)=0x1000000000d) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = getpid() getpgid(r8) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) r9 = syz_open_procfs$namespace(0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003400)={0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000000940)=ANY=[@ANYBLOB="1080090000009d681f500000000000ffff000038626e92a669d5b2d5003ad69dc6cb1cc49747e5c8fc5aff86aab9e2c081aaed478cbd3c879386a1325d3ee75ce98186697964e524974659261fc099c589aeb708b511"], 0x10}], 0x1}, 0x0) ptrace$pokeuser(0x6, 0x0, 0x81, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, 0x0) sendmsg$netlink(r7, &(0x7f0000000840)={&(0x7f00000001c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x80}, 0xc, &(0x7f0000000240)=[{&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x34}], 0x1, &(0x7f0000000c40)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES64, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r6, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYBLOB="000000000100008001000000000000000000", @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="650000009aa5f1c3391676da551c0000000000f9ffffffffffffff0000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYBLOB="fcfc3f6336d2a69e2bb9950fcde71a1d1b6eaebc694c19b457873d162815268793007f1902fbbf8b19b77c8180ffb1445c7e53199d804a28189810f1adcfa1d569e662378f31338144b3faeb9316fd7a97713f43b430a7810df61c970c8f78b1330098f03ec8eee5e63775fba2775b6596d0fecc44162214451acb4eb360eface1a342eaf2d859ec20b90d9b82d92282d845f2ab9d9d1e13fa322dfa30b0ff5c633233ffb797ad3728f9284aa4158e8314ff1cac819357afbc2c310dbc20aa", @ANYRES32=0xee01, @ANYRES32=r2, @ANYBLOB="eeffffff9198f015000800000100000001006dd54b560000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r10, @ANYRESDEC=r4, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6], 0x118, 0xc080}, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000600)=0x5) r11 = gettid() fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff0000000000008067da969e00", @ANYRES32=r11, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRESDEC=r1], 0x40}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) 04:59:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 92) 04:59:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000000000000002898bbb7c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd78000000008000000000000000"], 0x1, 0x793, &(0x7f0000001700)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x29000) 04:59:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) pwritev2(r0, &(0x7f0000000200)=[{&(0x7f0000000240)='6', 0x1}], 0x1, 0x0, 0x0, 0x1c) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, 0x0) 04:59:23 executing program 4: waitid(0x0, 0x0, 0x0, 0x80000008, 0x0) rt_sigreturn() waitid(0x0, 0x0, 0x0, 0x0, 0x0) [ 372.814959][T16472] loop2: detected capacity change from 0 to 2048 [ 372.823082][T16472] EXT4-fs: Ignoring removed oldalloc option [ 372.829818][T16472] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 372.851046][T16472] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:59:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000000000000002898bbb7c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd78000000008000000000000000"], 0x1, 0x793, &(0x7f0000001700)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) sched_setscheduler(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x29000) [ 372.885321][ T27] audit: type=1400 audit(1699678763.655:387): avc: denied { append } for pid=16471 comm="syz-executor.2" path="/root/syzkaller-testdir2595261091/syzkaller.cy6qMz/731/file0/blkio.throttle.io_serviced_recursive" dev="loop2" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 04:59:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000000000000002898bbb7c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd78000000008000000000000000"], 0x1, 0x793, &(0x7f0000001700)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) sched_setscheduler(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x29000) 04:59:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000000000000002898bbb7c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd78000000008000000000000000"], 0x1, 0x793, &(0x7f0000001700)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sched_setscheduler(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) sched_setscheduler(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x29000) [ 372.928119][ T3113] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 372.941090][T16482] loop1: detected capacity change from 0 to 2048 [ 372.949296][T16481] loop5: detected capacity change from 0 to 2048 [ 372.964305][T16481] EXT4-fs: Ignoring removed oldalloc option [ 372.975699][T16481] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 372.986053][T16487] loop4: detected capacity change from 0 to 2048 [ 373.023074][T16489] loop2: detected capacity change from 0 to 2048 [ 373.031424][T16489] EXT4-fs: Ignoring removed oldalloc option [ 373.048381][T16489] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 373.067078][T16487] EXT4-fs: Ignoring removed oldalloc option [ 373.083294][T16487] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 373.146252][T16482] FAULT_INJECTION: forcing a failure. [ 373.146252][T16482] name failslab, interval 1, probability 0, space 0, times 0 [ 373.159144][T16482] CPU: 0 PID: 16482 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 373.169323][T16482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 373.179745][T16482] Call Trace: [ 373.183051][T16482] [ 373.186003][T16482] dump_stack_lvl+0xda/0x130 [ 373.190653][T16482] dump_stack+0x15/0x20 [ 373.194929][T16482] should_fail_ex+0x21f/0x230 [ 373.199652][T16482] ? iter_file_splice_write+0xeb/0x7e0 [ 373.205304][T16482] __should_failslab+0x92/0xa0 [ 373.210117][T16482] should_failslab+0x9/0x20 [ 373.214757][T16482] __kmem_cache_alloc_node+0x4e/0x210 [ 373.220435][T16482] ? splice_from_pipe+0xe0/0xe0 [ 373.225386][T16482] ? iter_file_splice_write+0xeb/0x7e0 [ 373.231036][T16482] __kmalloc+0x95/0x1a0 [ 373.235430][T16482] iter_file_splice_write+0xeb/0x7e0 [ 373.240758][T16482] ? splice_from_pipe+0xe0/0xe0 [ 373.245758][T16482] direct_splice_actor+0x8a/0xb0 [ 373.250861][T16482] splice_direct_to_actor+0x31d/0x690 [ 373.256314][T16482] ? direct_file_splice_eof+0x70/0x70 [ 373.262255][T16482] do_splice_direct+0x10d/0x190 [ 373.267199][T16482] ? do_splice_direct+0x190/0x190 [ 373.272271][T16482] do_sendfile+0x3c4/0x980 [ 373.276737][T16482] __x64_sys_sendfile64+0x110/0x150 [ 373.282139][T16482] do_syscall_64+0x44/0x110 [ 373.286790][T16482] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 373.292848][T16482] RIP: 0033:0x7f8517f84ae9 [ 373.297274][T16482] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 373.316917][T16482] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 373.325384][T16482] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 373.333484][T16482] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 373.341880][T16482] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 373.342355][T16495] loop3: detected capacity change from 0 to 2048 [ 373.350278][T16482] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 373.350308][T16482] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 373.358376][T16495] EXT4-fs: Ignoring removed oldalloc option [ 373.364897][T16482] [ 373.373759][T16481] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 373.394222][T16494] wireguard0: entered promiscuous mode [ 373.399776][T16494] wireguard0: entered allmulticast mode [ 373.405599][T16495] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 373.418642][T16489] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:59:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 93) 04:59:24 executing program 2: r0 = fsopen(&(0x7f0000000000)='debugfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0) 04:59:24 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 373.440321][T16487] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 373.441882][T16495] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 373.498100][T16505] loop1: detected capacity change from 0 to 2048 [ 373.500205][ T3113] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:59:24 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0x5452, &(0x7f0000000340)=ANY=[@ANYBLOB="01"]) [ 373.524568][ T27] audit: type=1400 audit(1699678764.295:388): avc: denied { mounton } for pid=16492 comm="syz-executor.3" path="/root/syzkaller-testdir2827549144/syzkaller.g6lfMr/868/file0/file0" dev="loop3" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 373.557215][ T3093] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 373.559850][ T3101] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 373.588423][ T3121] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 373.590677][ T27] audit: type=1400 audit(1699678764.365:389): avc: denied { mount } for pid=16506 comm="syz-executor.2" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 373.646151][T16505] FAULT_INJECTION: forcing a failure. [ 373.646151][T16505] name failslab, interval 1, probability 0, space 0, times 0 [ 373.659181][T16505] CPU: 1 PID: 16505 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 373.669406][T16505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 373.679654][T16505] Call Trace: [ 373.682963][T16505] [ 373.685928][T16505] dump_stack_lvl+0xda/0x130 [ 373.690659][T16505] dump_stack+0x15/0x20 [ 373.694866][T16505] should_fail_ex+0x21f/0x230 [ 373.699594][T16505] ? __blockdev_direct_IO+0x137/0x1f90 [ 373.705127][T16505] __should_failslab+0x92/0xa0 [ 373.709970][T16505] should_failslab+0x9/0x20 [ 373.714561][T16505] kmem_cache_alloc+0x4e/0x250 [ 373.719474][T16505] __blockdev_direct_IO+0x137/0x1f90 [ 373.724943][T16505] ? __rcu_read_unlock+0x4d/0x70 [ 373.729975][T16505] ? find_get_entries+0x397/0x410 [ 373.735268][T16505] ? fat_block_truncate_page+0x40/0x40 [ 373.740748][T16505] ? invalidate_inode_pages2_range+0x6cc/0x720 [ 373.747326][T16505] fat_direct_IO+0x110/0x1d0 [ 373.751981][T16505] generic_file_direct_write+0xab/0x1f0 [ 373.757579][T16505] ? mnt_put_write_access_file+0x95/0xb0 [ 373.763323][T16505] __generic_file_write_iter+0xae/0x120 [ 373.768935][T16505] generic_file_write_iter+0x7d/0x1c0 [ 373.774345][T16505] do_iter_write+0x4ad/0x770 [ 373.779094][T16505] ? iter_file_splice_write+0xeb/0x7e0 [ 373.784573][T16505] vfs_iter_write+0x56/0x70 [ 373.789143][T16505] iter_file_splice_write+0x462/0x7e0 [ 373.794737][T16505] ? splice_from_pipe+0xe0/0xe0 [ 373.799672][T16505] direct_splice_actor+0x8a/0xb0 [ 373.804655][T16505] splice_direct_to_actor+0x31d/0x690 [ 373.810046][T16505] ? direct_file_splice_eof+0x70/0x70 [ 373.815521][T16505] do_splice_direct+0x10d/0x190 [ 373.820453][T16505] ? do_splice_direct+0x190/0x190 [ 373.825508][T16505] do_sendfile+0x3c4/0x980 [ 373.829948][T16505] __x64_sys_sendfile64+0x110/0x150 [ 373.835290][T16505] do_syscall_64+0x44/0x110 [ 373.839897][T16505] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 373.846704][T16505] RIP: 0033:0x7f8517f84ae9 [ 373.851389][T16505] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 373.872330][T16505] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 373.881141][T16505] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 373.889340][T16505] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 04:59:24 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00') r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000340), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000480)=""/63, 0x3f}, {&(0x7f00000004c0)=""/164, 0xa4}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0xc0}, 0x0) sched_setaffinity(0x0, 0xfffffffffffffea1, &(0x7f0000000200)=0x1000000000d) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = getpid() getpgid(r8) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) r9 = syz_open_procfs$namespace(0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003400)={0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000000940)=ANY=[@ANYBLOB="1080090000009d681f500000000000ffff000038626e92a669d5b2d5003ad69dc6cb1cc49747e5c8fc5aff86aab9e2c081aaed478cbd3c879386a1325d3ee75ce98186697964e524974659261fc099c589aeb708b511"], 0x10}], 0x1}, 0x0) ptrace$pokeuser(0x6, 0x0, 0x81, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, 0x0) sendmsg$netlink(r7, &(0x7f0000000840)={&(0x7f00000001c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x80}, 0xc, &(0x7f0000000240)=[{&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x34}], 0x1, &(0x7f0000000c40)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES64, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r6, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYBLOB="000000000100008001000000000000000000", @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="650000009aa5f1c3391676da551c0000000000f9ffffffffffffff0000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYBLOB="fcfc3f6336d2a69e2bb9950fcde71a1d1b6eaebc694c19b457873d162815268793007f1902fbbf8b19b77c8180ffb1445c7e53199d804a28189810f1adcfa1d569e662378f31338144b3faeb9316fd7a97713f43b430a7810df61c970c8f78b1330098f03ec8eee5e63775fba2775b6596d0fecc44162214451acb4eb360eface1a342eaf2d859ec20b90d9b82d92282d845f2ab9d9d1e13fa322dfa30b0ff5c633233ffb797ad3728f9284aa4158e8314ff1cac819357afbc2c310dbc20aa", @ANYRES32=0xee01, @ANYRES32=r2, @ANYBLOB="eeffffff9198f015000800000100000001006dd54b560000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r10, @ANYRESDEC=r4, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6], 0x118, 0xc080}, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000600)=0x5) r11 = gettid() fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff0000000000008067da969e00", @ANYRES32=r11, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRESDEC=r1], 0x40}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) 04:59:24 executing program 4: lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee00) 04:59:24 executing program 3: r0 = fsopen(&(0x7f0000000040)='cifs\x00', 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x8, 0x0, 0x0, 0x0) 04:59:24 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) 04:59:24 executing program 5: get_robust_list(0x0, &(0x7f0000000c00)=0x0, &(0x7f0000000c40)) 04:59:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 94) [ 373.897317][T16505] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 373.905344][T16505] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 373.913410][T16505] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 373.921426][T16505] 04:59:24 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0xffff}) 04:59:24 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0xaa11eac3f3af0b91, r0, 0x0) 04:59:24 executing program 4: r0 = syz_io_uring_setup(0x5022, &(0x7f0000000800)={0x0, 0x0, 0x40}, &(0x7f0000000880), &(0x7f00000008c0)) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0xc, 0x0, 0x0) [ 373.983370][T16519] loop1: detected capacity change from 0 to 2048 [ 374.174351][T16534] wireguard0: entered promiscuous mode [ 374.179998][T16534] wireguard0: entered allmulticast mode 04:59:25 executing program 5: chmod(&(0x7f0000007140)='./file0\x00', 0x0) 04:59:25 executing program 2: r0 = fsopen(&(0x7f00000000c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000100)='*:\x00', &(0x7f0000000140)='nfs4\x00', 0x0) 04:59:25 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, 0x0) [ 374.681317][T16519] syz-executor.1: attempt to access beyond end of device [ 374.681317][T16519] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:25 executing program 3: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 04:59:25 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x430781, 0x0) readv(r0, 0x0, 0x0) 04:59:25 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x40049409, 0x0) 04:59:25 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x430781, 0x0) 04:59:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 95) 04:59:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00') r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000340), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000480)=""/63, 0x3f}, {&(0x7f00000004c0)=""/164, 0xa4}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0xc0}, 0x0) sched_setaffinity(0x0, 0xfffffffffffffea1, &(0x7f0000000200)=0x1000000000d) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = getpid() getpgid(r8) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) r9 = syz_open_procfs$namespace(0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003400)={0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000000940)=ANY=[@ANYBLOB="1080090000009d681f500000000000ffff000038626e92a669d5b2d5003ad69dc6cb1cc49747e5c8fc5aff86aab9e2c081aaed478cbd3c879386a1325d3ee75ce98186697964e524974659261fc099c589aeb708b511"], 0x10}], 0x1}, 0x0) ptrace$pokeuser(0x6, 0x0, 0x81, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, 0x0) sendmsg$netlink(r7, &(0x7f0000000840)={&(0x7f00000001c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x80}, 0xc, &(0x7f0000000240)=[{&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x34}], 0x1, &(0x7f0000000c40)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES64, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r6, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYBLOB="000000000100008001000000000000000000", @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="650000009aa5f1c3391676da551c0000000000f9ffffffffffffff0000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYBLOB="fcfc3f6336d2a69e2bb9950fcde71a1d1b6eaebc694c19b457873d162815268793007f1902fbbf8b19b77c8180ffb1445c7e53199d804a28189810f1adcfa1d569e662378f31338144b3faeb9316fd7a97713f43b430a7810df61c970c8f78b1330098f03ec8eee5e63775fba2775b6596d0fecc44162214451acb4eb360eface1a342eaf2d859ec20b90d9b82d92282d845f2ab9d9d1e13fa322dfa30b0ff5c633233ffb797ad3728f9284aa4158e8314ff1cac819357afbc2c310dbc20aa", @ANYRES32=0xee01, @ANYRES32=r2, @ANYBLOB="eeffffff9198f015000800000100000001006dd54b560000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r10, @ANYRESDEC=r4, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6], 0x118, 0xc080}, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000600)=0x5) r11 = gettid() fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff0000000000008067da969e00", @ANYRES32=r11, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRESDEC=r1], 0x40}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) 04:59:25 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000240)={{0x1, 0x1, 0x18}, './file0/file0\x00'}) 04:59:25 executing program 2: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x17e, &(0x7f0000000080)={[0x19d]}, 0x8) 04:59:25 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) 04:59:25 executing program 5: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 04:59:25 executing program 3: r0 = syz_io_uring_setup(0x5022, &(0x7f0000000800), &(0x7f0000000880), &(0x7f00000008c0)) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x9, 0x0, 0x0) [ 374.844058][T16548] loop1: detected capacity change from 0 to 2048 04:59:25 executing program 3: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000280)) r1 = dup2(r0, r0) writev(r1, 0x0, 0x0) [ 375.066088][T16570] wireguard0: entered promiscuous mode [ 375.071798][T16570] wireguard0: entered allmulticast mode [ 375.575569][T16548] syz-executor.1: attempt to access beyond end of device [ 375.575569][T16548] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:26 executing program 0: r0 = syz_io_uring_setup(0x5022, &(0x7f0000000800), &(0x7f0000000880), &(0x7f00000008c0)) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x4, 0x0, 0x0) 04:59:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, &(0x7f00000004c0)={[{@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffbdc}}, {@iocharset={'iocharset', 0x3d, 'cp950'}}, {@rodir}, {@fat=@tz_utc}, {@uni_xlateno}, {@shortname_mixed}, {@fat=@debug}, {@fat=@codepage={'codepage', 0x3d, '775'}}, {@shortname_lower}, {@fat=@errors_remount}, {@shortname_winnt}, {@rodir}, {@utf8no}, {@uni_xlate}]}, 0x1, 0x25f, &(0x7f0000000240)="$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") open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:59:26 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0x5452, &(0x7f0000000340)=ANY=[]) 04:59:26 executing program 5: mknodat$null(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x103) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 04:59:26 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x430781, 0x0) lseek(r0, 0xfffffffffffffffc, 0x0) 04:59:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 96) 04:59:26 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:26 executing program 2: rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 04:59:26 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0x5421, &(0x7f0000000340)=ANY=[]) 04:59:26 executing program 0: r0 = fsopen(&(0x7f00000001c0)='autofs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 375.710389][T16584] loop3: detected capacity change from 0 to 256 [ 375.729970][T16583] loop1: detected capacity change from 0 to 2048 [ 375.749507][T16584] FAT-fs (loop3): codepage cp775 not found 04:59:26 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 04:59:26 executing program 5: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000280)) fcntl$getownex(r0, 0x4, &(0x7f0000000480)) 04:59:26 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/notes', 0x820082, 0x0) 04:59:26 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x430781, 0x0) fallocate(r0, 0x0, 0x0, 0x8) [ 375.792964][T16595] loop4: detected capacity change from 0 to 256 04:59:26 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:26 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:26 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) [ 375.908618][T16608] loop4: detected capacity change from 0 to 256 [ 375.916615][T16611] loop2: detected capacity change from 0 to 256 [ 375.932513][T16612] loop3: detected capacity change from 0 to 256 04:59:26 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x5450, 0x0) 04:59:26 executing program 5: epoll_create1(0x57c7f87aa62065b1) 04:59:26 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:26 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:26 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 97) 04:59:26 executing program 0: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs2/custom0\x00') [ 376.170364][T16583] syz-executor.1: attempt to access beyond end of device [ 376.170364][T16583] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:27 executing program 5: r0 = fsopen(&(0x7f0000000040)='nfsd\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x8, 0x0, 0x0, 0x0) 04:59:27 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:27 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc018937b, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018"]) [ 376.213850][T16618] loop2: detected capacity change from 0 to 256 [ 376.219382][T16621] loop3: detected capacity change from 0 to 256 [ 376.230846][T16619] loop4: detected capacity change from 0 to 256 04:59:27 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:27 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0x40086602, &(0x7f0000000340)=ANY=[]) 04:59:27 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 04:59:27 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) [ 376.299157][T16631] loop3: detected capacity change from 0 to 256 04:59:27 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) [ 376.345591][T16633] loop1: detected capacity change from 0 to 2048 [ 376.377812][T16639] loop2: detected capacity change from 0 to 256 [ 376.387270][T16641] loop4: detected capacity change from 0 to 256 04:59:27 executing program 5: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000280)) fcntl$getownex(r0, 0x11, &(0x7f0000000480)) 04:59:27 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) [ 376.397680][ T27] audit: type=1400 audit(1699678767.165:390): avc: denied { setattr } for pid=16637 comm="syz-executor.0" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 376.434940][T16645] loop3: detected capacity change from 0 to 256 [ 376.491393][T16648] loop2: detected capacity change from 0 to 256 04:59:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 98) 04:59:27 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x430781, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}}}, 0x38) fallocate(r0, 0x0, 0x0, 0x8) 04:59:27 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68) 04:59:27 executing program 5: syz_io_uring_setup(0xeca, &(0x7f0000000100)={0x0, 0x254, 0x8}, 0x0, 0x0) 04:59:27 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') 04:59:27 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') [ 376.694528][T16633] syz-executor.1: attempt to access beyond end of device [ 376.694528][T16633] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 376.729309][T16653] loop4: detected capacity change from 0 to 256 [ 376.729851][T16651] loop3: detected capacity change from 0 to 256 04:59:27 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x410002, 0x0) 04:59:27 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rmdir(&(0x7f0000000140)='./file0\x00') 04:59:27 executing program 5: r0 = fsopen(&(0x7f0000000080)='msdos\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='dirsync\x00', 0x0, 0x0) 04:59:27 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8004, 0x0) 04:59:27 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68) [ 376.786763][T16657] loop2: detected capacity change from 0 to 256 04:59:27 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') [ 376.848250][T16665] loop3: detected capacity change from 0 to 256 [ 376.891786][T16671] loop4: detected capacity change from 0 to 256 [ 376.892532][T16666] loop1: detected capacity change from 0 to 2048 [ 376.911468][T16672] loop2: detected capacity change from 0 to 256 04:59:28 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rmdir(&(0x7f0000000140)='./file0\x00') 04:59:28 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000340)=ANY=[@ANYBLOB="0100000001", @ANYRES32]) 04:59:28 executing program 5: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000080)) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x40049409, 0x0) 04:59:28 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68) 04:59:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 99) 04:59:28 executing program 2: rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') [ 377.199834][T16666] syz-executor.1: attempt to access beyond end of device [ 377.199834][T16666] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:28 executing program 2: rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') 04:59:28 executing program 5: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000280)) dup2(r0, 0xffffffffffffffff) [ 377.237800][T16681] autofs4:pid:16681:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.4294967041), cmd(0xc0189373) [ 377.239894][T16679] loop3: detected capacity change from 0 to 256 [ 377.252061][T16681] autofs4:pid:16681:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc0189373) [ 377.276144][T16684] loop4: detected capacity change from 0 to 256 04:59:28 executing program 2: rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') 04:59:28 executing program 0: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f00000003c0)='\"', &(0x7f0000000400)='./file0\x00', 0xffffffffffffff9c) 04:59:28 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rmdir(&(0x7f0000000140)='./file0\x00') 04:59:28 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(0x0, &(0x7f00000026c0)='./file1\x00') 04:59:28 executing program 0: r0 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000040)='./bus\x00', 0x147042, 0x0) sendfile(r1, r1, 0x0, 0x1000000201005) lseek(r1, 0x0, 0x4) 04:59:28 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(0x0, &(0x7f00000026c0)='./file1\x00') [ 377.342835][T16683] loop1: detected capacity change from 0 to 2048 [ 377.369392][T16695] loop2: detected capacity change from 0 to 256 04:59:28 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:28 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000006d00)={0x70}, 0x20) [ 377.399090][T16697] loop3: detected capacity change from 0 to 256 [ 377.416303][T16700] loop2: detected capacity change from 0 to 256 [ 377.439621][T16683] FAULT_INJECTION: forcing a failure. [ 377.439621][T16683] name failslab, interval 1, probability 0, space 0, times 0 [ 377.452480][T16683] CPU: 1 PID: 16683 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 377.462595][T16683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 377.472684][T16683] Call Trace: [ 377.475988][T16683] [ 377.478921][T16683] dump_stack_lvl+0xda/0x130 [ 377.483525][T16683] dump_stack+0x15/0x20 [ 377.487702][T16683] should_fail_ex+0x21f/0x230 [ 377.492474][T16683] ? iter_file_splice_write+0xeb/0x7e0 [ 377.497978][T16683] __should_failslab+0x92/0xa0 [ 377.502891][T16683] should_failslab+0x9/0x20 [ 377.507420][T16683] __kmem_cache_alloc_node+0x4e/0x210 [ 377.512880][T16683] ? splice_from_pipe+0xe0/0xe0 [ 377.518031][T16683] ? iter_file_splice_write+0xeb/0x7e0 [ 377.523552][T16683] __kmalloc+0x95/0x1a0 [ 377.527764][T16683] iter_file_splice_write+0xeb/0x7e0 [ 377.533160][T16683] ? splice_from_pipe+0xe0/0xe0 [ 377.538127][T16683] direct_splice_actor+0x8a/0xb0 [ 377.543085][T16683] splice_direct_to_actor+0x31d/0x690 [ 377.548552][T16683] ? direct_file_splice_eof+0x70/0x70 [ 377.553972][T16683] do_splice_direct+0x10d/0x190 [ 377.559013][T16683] ? do_splice_direct+0x190/0x190 [ 377.564056][T16683] do_sendfile+0x3c4/0x980 [ 377.568513][T16683] __x64_sys_sendfile64+0x110/0x150 [ 377.574066][T16683] do_syscall_64+0x44/0x110 [ 377.578717][T16683] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 377.584690][T16683] RIP: 0033:0x7f8517f84ae9 [ 377.589143][T16683] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 377.608960][T16683] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 377.617701][T16683] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 377.625700][T16683] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 04:59:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (fail_nth: 100) 04:59:28 executing program 3: rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') 04:59:28 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(0x0, &(0x7f00000026c0)='./file1\x00') [ 377.633796][T16683] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 377.641909][T16683] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000002 [ 377.649969][T16683] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 377.658046][T16683] 04:59:28 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/ipc\x00') 04:59:28 executing program 3: rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') [ 377.718812][T16706] loop4: detected capacity change from 0 to 256 04:59:28 executing program 3: rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') 04:59:28 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:28 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(0x0, &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') [ 377.763660][T16711] loop2: detected capacity change from 0 to 256 [ 377.791781][T16710] loop1: detected capacity change from 0 to 2048 [ 377.858865][T16719] loop4: detected capacity change from 0 to 256 [ 377.881811][T16721] loop3: detected capacity change from 0 to 256 [ 377.901006][T16710] FAULT_INJECTION: forcing a failure. [ 377.901006][T16710] name failslab, interval 1, probability 0, space 0, times 0 [ 377.913713][T16710] CPU: 0 PID: 16710 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 377.923871][T16710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 377.934043][T16710] Call Trace: [ 377.937416][T16710] [ 377.940374][T16710] dump_stack_lvl+0xda/0x130 [ 377.945073][T16710] dump_stack+0x15/0x20 [ 377.949271][T16710] should_fail_ex+0x21f/0x230 [ 377.954078][T16710] ? __blockdev_direct_IO+0x137/0x1f90 [ 377.959567][T16710] __should_failslab+0x92/0xa0 [ 377.964565][T16710] should_failslab+0x9/0x20 [ 377.969204][T16710] kmem_cache_alloc+0x4e/0x250 [ 377.974202][T16710] __blockdev_direct_IO+0x137/0x1f90 [ 377.979673][T16710] ? __rcu_read_unlock+0x4d/0x70 [ 377.984954][T16710] ? find_get_entries+0x397/0x410 [ 377.990204][T16710] ? fat_block_truncate_page+0x40/0x40 [ 377.995692][T16710] ? invalidate_inode_pages2_range+0x6cc/0x720 [ 378.002125][T16710] fat_direct_IO+0x110/0x1d0 [ 378.006962][T16710] generic_file_direct_write+0xab/0x1f0 [ 378.012577][T16710] ? mnt_put_write_access_file+0x95/0xb0 [ 378.018296][T16710] __generic_file_write_iter+0xae/0x120 [ 378.023887][T16710] generic_file_write_iter+0x7d/0x1c0 [ 378.029385][T16710] do_iter_write+0x4ad/0x770 [ 378.034019][T16710] ? iter_file_splice_write+0xeb/0x7e0 [ 378.039607][T16710] vfs_iter_write+0x56/0x70 [ 378.044147][T16710] iter_file_splice_write+0x462/0x7e0 [ 378.049574][T16710] ? splice_from_pipe+0xe0/0xe0 [ 378.054772][T16710] direct_splice_actor+0x8a/0xb0 [ 378.059823][T16710] splice_direct_to_actor+0x31d/0x690 [ 378.065234][T16710] ? direct_file_splice_eof+0x70/0x70 [ 378.070803][T16710] do_splice_direct+0x10d/0x190 [ 378.075720][T16710] ? do_splice_direct+0x190/0x190 [ 378.081060][T16710] do_sendfile+0x3c4/0x980 [ 378.085640][T16710] __x64_sys_sendfile64+0x110/0x150 [ 378.090905][T16710] do_syscall_64+0x44/0x110 [ 378.095553][T16710] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 378.101515][T16710] RIP: 0033:0x7f8517f84ae9 [ 378.105939][T16710] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 378.125840][T16710] RSP: 002b:00007f85173070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 378.134330][T16710] RAX: ffffffffffffffda RBX: 00007f85180a3f80 RCX: 00007f8517f84ae9 [ 378.142323][T16710] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 378.150330][T16710] RBP: 00007f8517307120 R08: 0000000000000000 R09: 0000000000000000 [ 378.158464][T16710] R10: 000000007fffff67 R11: 0000000000000246 R12: 0000000000000003 [ 378.166641][T16710] R13: 000000000000000b R14: 00007f85180a3f80 R15: 00007fffc2804d38 [ 378.174642][T16710] 04:59:29 executing program 0: r0 = fsopen(&(0x7f0000000040)='binder\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x8, 0x0, 0x0, 0x0) 04:59:29 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0) 04:59:29 executing program 5: openat$random(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) 04:59:29 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:29 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(0x0, &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') 04:59:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) 04:59:29 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x26802, 0x0) 04:59:29 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:29 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0) 04:59:29 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(0x0, &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') [ 378.259482][T16724] loop2: detected capacity change from 0 to 256 [ 378.276123][T16726] loop4: detected capacity change from 0 to 256 [ 378.294246][T16734] loop3: detected capacity change from 0 to 256 04:59:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_mcast\x00') preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000000)=""/201, 0xc9}], 0x1, 0xb8, 0x0) 04:59:29 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) [ 378.336817][T16731] loop1: detected capacity change from 0 to 2048 [ 378.349719][T16738] loop0: detected capacity change from 0 to 256 [ 378.370657][T16741] loop3: detected capacity change from 0 to 256 [ 378.371701][T16742] loop2: detected capacity change from 0 to 256 04:59:29 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:29 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0) rmdir(&(0x7f0000000140)='./file0\x00') 04:59:29 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_tos_int={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x30}}], 0x1, 0x0) 04:59:29 executing program 2: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0) [ 378.440826][T16746] loop4: detected capacity change from 0 to 256 04:59:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x3) sched_setscheduler(r2, 0x0, &(0x7f0000000440)=0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0xbb, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xc7b) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0xa) sched_setaffinity(0x0, 0x8, &(0x7f0000000480)=0x1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000540)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x59}) socket$inet6(0xa, 0x401000000001, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x2) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d1) [ 378.481414][T16749] loop0: detected capacity change from 0 to 256 [ 378.504602][T16753] loop2: detected capacity change from 0 to 256 [ 378.523168][T16755] loop3: detected capacity change from 0 to 256 04:59:29 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0) rmdir(&(0x7f0000000140)='./file0\x00') 04:59:29 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:29 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0xc, 0x7, 0x3, 0x0, [{@broadcast}]}]}}}], 0x20}}], 0x1, 0x0) 04:59:29 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff66) [ 378.771527][T16731] syz-executor.1: attempt to access beyond end of device [ 378.771527][T16731] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 378.809943][T16760] loop0: detected capacity change from 0 to 256 04:59:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='totmaps\x00') preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000000)=""/201, 0xc9}], 0x1, 0xb8, 0x0) 04:59:29 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0) rmdir(&(0x7f0000000140)='./file0\x00') [ 378.815668][T16762] loop3: detected capacity change from 0 to 256 [ 378.832792][T16763] loop4: detected capacity change from 0 to 256 04:59:29 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') [ 378.864858][T16767] loop1: detected capacity change from 0 to 2048 04:59:29 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:29 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x389801, 0x0) fallocate(r0, 0x0, 0x0, 0x0) [ 378.908163][T16770] loop3: detected capacity change from 0 to 256 [ 378.935866][T16773] loop0: detected capacity change from 0 to 256 04:59:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x16, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) [ 378.970623][T16776] loop4: detected capacity change from 0 to 256 [ 379.232570][T16767] syz-executor.1: attempt to access beyond end of device [ 379.232570][T16767] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001900010000000000008000000a00000000000000000000000c000900080000003c"], 0x28}}, 0x0) 04:59:30 executing program 4: rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:30 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(0x0) 04:59:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000001080)={0x10, 0x0, 0x25dfdbfb, 0x100000}, 0xc) 04:59:30 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff68) 04:59:30 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(0x0) 04:59:30 executing program 4: rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:30 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getpgid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0xbb, 0x0) sched_setaffinity(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) r3 = socket$netlink(0x10, 0x3, 0xa) sched_setaffinity(0x0, 0x8, &(0x7f0000000480)=0x1) syz_clone3(0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000540)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x59}) socket$inet6(0xa, 0x401000000001, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x2) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d1) 04:59:30 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000003280)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0xf}}], 0x1, 0x0) [ 379.369413][T16786] loop0: detected capacity change from 0 to 256 [ 379.373212][T16787] loop3: detected capacity change from 0 to 256 [ 379.385773][ T27] audit: type=1400 audit(1699678770.155:391): avc: denied { bind } for pid=16780 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 379.394895][T16785] loop1: detected capacity change from 0 to 2048 04:59:30 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:30 executing program 4: rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:30 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000003280)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0xf}}], 0x1, 0x0) 04:59:30 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rename(0x0, &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) [ 379.499841][T16799] loop3: detected capacity change from 0 to 256 04:59:30 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(0x0) 04:59:30 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000003280)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0xf}}], 0x1, 0x0) 04:59:30 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') [ 379.549335][T16803] loop0: detected capacity change from 0 to 256 [ 379.577355][T16808] loop4: detected capacity change from 0 to 256 [ 379.644194][T16813] loop3: detected capacity change from 0 to 256 [ 379.661454][T16815] loop0: detected capacity change from 0 to 256 04:59:30 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) sendmmsg$inet(r0, &(0x7f0000006400)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000003280)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0xf}}], 0x1, 0x0) 04:59:30 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(0x0, &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000000)={[{@dax}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@noquota}]}, 0x1, 0x44d, &(0x7f0000000580)="$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") [ 379.838007][T16785] syz-executor.1: attempt to access beyond end of device [ 379.838007][T16785] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 379.882769][T16820] loop4: detected capacity change from 0 to 256 [ 379.888382][T16821] loop3: detected capacity change from 0 to 512 [ 379.901961][T16821] EXT4-fs: dax option not supported 04:59:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x8000, 0x10) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) 04:59:31 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:31 executing program 5: unshare(0x8000000) unshare(0xa000000) 04:59:31 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(0x0, &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:31 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x8876, 0x40000800) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1) 04:59:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) 04:59:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000000040), 0x10, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0xfffffc9e, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/58, 0x3a}], 0x1}, 0x0) 04:59:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev}, 0x10) sendmmsg$inet(r1, &(0x7f0000000ec0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, 0x0}}], 0x1, 0x2000c044) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 04:59:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) [ 380.319266][T16824] loop0: detected capacity change from 0 to 256 [ 380.341529][T16833] loop4: detected capacity change from 0 to 256 04:59:31 executing program 5: r0 = socket(0x18, 0x1, 0x0) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f0000000880)="a7", 0x1}], 0x1, 0x0, 0x0) getsockname$inet(r0, &(0x7f00000000c0), &(0x7f0000000000)=0xffffffffffffff35) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x2, 0x2, 0x0) dup2(r0, r3) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x6}, 0x1c) 04:59:31 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0) rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) [ 380.366027][T16830] loop1: detected capacity change from 0 to 2048 [ 380.442421][T16845] loop4: detected capacity change from 0 to 256 04:59:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x8000, 0x10) (async) open(&(0x7f0000000200)='./file0\x00', 0x8000, 0x10) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) 04:59:31 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) 04:59:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4) sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001340)="45f9e8e5af9f7e488a1619ea0cd4902570249f1e29b175dfa0d3ae9be1933b972b835f966d432045a33e064403006bdb8ef95b90e76baae34f74778049ff8fa4a59adf7623aaddb922b32dbbfda740b88a07e87eb2cd97c0393db1036a1ec8a376c919cdd0b40dbb899c07f1349c7a1113f57495c795bc7e38166a7bdef463457189549f4b13279fffd050bdfea3477a62d3edea8321a2e98c65330fe7199ca6bee7202aa5a5d56c4ed4c22dbb28cebcaec033c75eb78820ad1d8ceb6f90b569e165002e702e1a206666d3c9d903ce78c73f778eae82d58317c634016a3e01ae29607f7b5ff253c607e4f60c0aa49021205073cdd574a3d4c25fbf79cc8ac99ff149ae54aa56286204e628dc2dfe4384ef74c8dac04ace6c5762d03f9e19942e4b6bbbb41fefc569cc23b3319d4ebc55551fecf8f936221e9787e744f2e1422baaa25b2f5bf59205190b7fe52f0641f149c5e00b764c493afadeaa04324783c268f48772b1c532d52d211865704db5fbafc3193385adc9855a1ad9ea0c05479329efd6c08ed22c5656eab2ea050f53bf441a9dfb4157d14b99214fa59b8b0e53200795762145a63d61c5c526edb03429e1e14072e1d7dff102fdb9801234bbbb8e0274a861dd60f3a21f129326b2f6fee61f690fa3967cdc5f6f9519282c48e28d6aa7d1b0ed07bdd72ebf1dd97b46f24ffde352095f4bffd6fdd0b9f0d60f16746f1c1ec46656cf94ae2237540c558c1863fb2ffd4619e5ee5b7aa5757e252b821e003fcef57f33cd70f19ec0b5f8098c030741147e8e4319109892fd56b22d261800b7107a393b9a7d835383e3504f5f2794f30914c4f8145ed446a06e3787eb32ab90abf595d45013c8b6d9c26cf4e60812b02427a4d2a8dcbdfaf8ace4e17f0f598676a5f26dc3615eddea77e1d68c857fbe2b39b67ccacd6afcea94b4f9592490c1a51e11f4ffc6dd4d4cdc44995b09864743b906e07a12c93045b654abf2faaf1127ee92698e09efee1d8d45ceb103973c3d1d5c98090d9af08789f867873bbeb522cb367bacaf2d94bc6fa7aab57b542af353d693230a3da636762204d96f2889f7decc9ad3992a8be2be92bdd6a7367bd64c8604ec219a92c80a7536f218926b5d18677f4bc22454a843f7ec6bfaadaec1a47896f902725cddc264226a0c7f673468459528101da2368d77d37d9ae6d52cb44efb9b5af74fdd4c8341980d7b3f4a3176c8de3c3a0144e3f327fcb30c6bda7a62ec37215367d06ef1b85fa2bc329fe99071f65b0d5a48b50139016b0753bc99c389f4aba551bf2da38b78e7b4dbb3be3ecf8749b39a022c86febf3a30070def590bd2a9cb0f95d09eac8de27c370d758e340193773a7dfbb2046e0b2e34bef073ed8368f4fbf464206fbe88c3260f6974b383bcf8a000db483d822536000df416d09dfc55c920cbc3c8b24af1757099903759e9312b576b9f04e61ae20a60d7d0ce978d193dbf9e7a20c04b4f985936402823feb4c045be085b565c283602d9f4c7efe1db4d81f126855712cb5d9cc86250c4b81f4cd823b4b3204d5e88c77f671b93f8ca0d7846a4eb429ab9aa3c8283e3aabe924b5b33d99ba5933d79856316642459e1b0806a0f7546fcf2db6159ad2f5d28c0141dc8777dbc67e3d1b02e2daa828eee0bb0fae22852012318cef6d55e0677fe28340f7c02b20ddbbeef78b6522d5c90540939b471306acadbfda2c3a91f9b5fa4d201c484b4a092a05fb2473610be8d70e662dd3113c892a5dab15e374ee246df73d53aadf43e46ef5fc5e53f81eeb8e234b4d4a26112e6db1f1ee915977a4aa2a564641ed13892342e76790b4a221977e1ac1692ff952c09f8f3405ed8867b36ca056d2b2457888cb6b5cf4a36beee3b493e26909614114a013855a1761c7597bd289bdc00ab3cbfb0735c865a025f56c2fb288e2348d65567931a3ab4bd83accb0b037b9379158ff7c2876f0444515a56d16acbb437fe9b91ede3622649ad89f377577a70f3abb37fd9f0a732cf849dd781eae1893bce173af5c455ba9f31259928ce60c338d74fcd1cf171b9fdc7db75b85114102e4c25f06540958e675ed538fc61b0243cd6a4565f8ffacb73032f13c4ba242671d2328aef233e921d19d625e79cde9d1b1c4f3e9e3a52e2f333050c1661b294a919faad9e946d893588ba0fbab294dc911af4cb782abcbf628adf724410f1014d70a0aabcaa7a9ec2", 0x62a}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:59:31 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0) rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:31 executing program 2: socketpair(0x18, 0x0, 0x8000, &(0x7f0000000240)) 04:59:31 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) 04:59:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0xf, 0xa001) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000000)={0x0, 0x1, [{0x0, 0x1}]}) [ 380.709566][T16830] syz-executor.1: attempt to access beyond end of device [ 380.709566][T16830] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 380.744149][T16853] loop4: detected capacity change from 0 to 256 [ 380.751951][T16855] loop0: detected capacity change from 0 to 256 04:59:31 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:31 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) 04:59:31 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', 0x0) rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) [ 380.840211][ T27] audit: type=1400 audit(1699678771.615:392): avc: denied { write } for pid=16862 comm="syz-executor.2" name="001" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 380.872059][T16868] loop0: detected capacity change from 0 to 256 04:59:31 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) [ 380.888055][T16866] loop4: detected capacity change from 0 to 256 [ 380.898849][T16860] loop1: detected capacity change from 0 to 2048 04:59:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") (async) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async, rerun: 32) open(&(0x7f0000000200)='./file0\x00', 0x8000, 0x10) (async, rerun: 32) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) (async, rerun: 32) sendfile(r1, r2, 0x0, 0x7fffff67) (rerun: 32) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) 04:59:32 executing program 5: r0 = socket(0x18, 0x0, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000a00)={&(0x7f0000000500)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f00000008c0)=[{0x0}, {0x0}], 0x2}, 0x102) 04:59:32 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:32 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:32 executing program 3: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) 04:59:32 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:32 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x0) read$usbfs(r0, &(0x7f0000000200)=""/249, 0xf9) 04:59:32 executing program 3: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) 04:59:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) bind$netlink(r0, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc) 04:59:32 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) [ 381.671676][ T27] audit: type=1400 audit(1699678772.445:393): avc: denied { read } for pid=16875 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 381.679784][T16881] loop4: detected capacity change from 0 to 256 [ 381.702090][T16884] loop0: detected capacity change from 0 to 256 04:59:32 executing program 3: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) 04:59:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext, 0x81002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[], 0x1, 0x541, &(0x7f0000000d40)="$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") r0 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffff67) 04:59:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) 04:59:32 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') [ 381.784708][T16895] loop4: detected capacity change from 0 to 256 [ 381.819965][T16899] loop1: detected capacity change from 0 to 2048 [ 381.875115][T16904] loop0: detected capacity change from 0 to 256 04:59:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) 04:59:32 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000280), 0xc) 04:59:32 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:32 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)=""/185, 0xb9}], 0x1) 04:59:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f00000006c0)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xca0, 0x8, 0x0, 0x1, [{0xa10, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x1d8, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x26}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x5c, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x238, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x44}}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x548, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x35}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7ff}]}, {0x258, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "80519ee09bcc7eca031f1842a075a5f26aeeb0be2f2e517f4a54fe410b37a029"}, @WGPEER_A_ALLOWEDIPS={0x220, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}]}]}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PEERS={0x20c, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_FLAGS={0x8}]}, {0x1f4, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "91a14b7f2ff70b40dd2c2d493b8d135e8d35fdc12a11fe95861754b5792b4c7e"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_ALLOWEDIPS={0x194, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3b}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}]}]}]}, 0xec8}}, 0x0) 04:59:32 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') [ 382.009790][T16910] loop0: detected capacity change from 0 to 256 [ 382.015900][T16912] loop4: detected capacity change from 0 to 256 04:59:32 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) [ 382.123644][T16923] loop4: detected capacity change from 0 to 256 [ 382.130188][T16924] loop0: detected capacity change from 0 to 256 04:59:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext, 0x81002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[], 0x1, 0x541, &(0x7f0000000d40)="$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") (async, rerun: 32) r0 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async, rerun: 32) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) (async) sendfile(r0, r1, 0x0, 0x7fffff67) 04:59:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, 0x0, 0x0) 04:59:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) 04:59:33 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:33 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:33 executing program 5: sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x9) [ 382.272559][T16899] syz-executor.1: attempt to access beyond end of device [ 382.272559][T16899] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, 0x0, 0x0) 04:59:33 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:33 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') [ 382.323711][T16933] loop0: detected capacity change from 0 to 256 [ 382.326117][T16929] loop4: detected capacity change from 0 to 256 04:59:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, 0x0, 0x0) 04:59:33 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/104, 0x68) 04:59:33 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='.\x00', 0x1a484bc, &(0x7f0000000180)=ANY=[@ANYRES8, @ANYBLOB="eea73c3ca047349ab66d529fb1e2bdc61875c6ccebea30ba1b8977c632ddcbe0ed04f986b68ee600044bd75d3cfd10cc2ec88ccff020447cd9caded4abf65767e9dbbd7b5841a8ce3eb44c719a2e6c341bf68b2a0af04f1cc951b190c7fd36ffdbd0622cdc9b7c9a55b3f465def5740814395f095fc44a4cf6fe14b0d31f384214d59a0105d577557215473973f3b70178f49f0e48dbe138562f4d21cad59fafb7fbaf76461c56fdd2093329e2ece7cf96435bca11a90ba7f31e69c4b73ba3d172906ffc90f5de134a696a731d20a9cf70009a31f83d4b774b0d99de69f14db9cdbde38324513798bba5", @ANYRESDEC, @ANYRESDEC, @ANYRESOCT, @ANYRES16, @ANYRESHEX, @ANYBLOB="01e676f4fc1904efc297a3baa083d7d53048014c35429e763c6f76637cfd7d7491fe31362d2af6bcf176cfa249a2b36a99ee6b5542c22763a0688867eb2ac09c5078d612c0133ef8a8f40074a8e540e5b262ac889ea44bc2a2bf39dd3ddfd962da624b3b25a036d7e94664086a77f49d81cf9630794a2a15d9e3042b8e67e81dec650851a472e1d5c14d7ff4", @ANYRESHEX], 0x1, 0x0, &(0x7f0000000480)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setscheduler(0x0, 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000040)={0x0, 0x0, 0x1b, 0x8, 0x100, &(0x7f0000000440)="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"}) [ 382.411883][T16937] loop1: detected capacity change from 0 to 2048 [ 382.449961][T16949] loop0: detected capacity change from 0 to 256 [ 382.451974][ T27] audit: type=1400 audit(1699678773.225:394): avc: denied { remount } for pid=16944 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 382.475107][T16952] loop4: detected capacity change from 0 to 256 [ 382.533191][T16937] loop1: detected capacity change from 0 to 2048 [ 382.577232][T16937] loop1: detected capacity change from 0 to 2048 [ 382.659526][T16937] loop1: detected capacity change from 0 to 2048 [ 382.707451][T16937] loop1: detected capacity change from 0 to 2048 [ 382.777567][T16937] loop1: detected capacity change from 0 to 2048 [ 382.827855][T16937] loop1: detected capacity change from 0 to 2048 [ 382.890389][T16937] loop1: detected capacity change from 0 to 2048 [ 382.939057][T16937] loop1: detected capacity change from 0 to 2048 [ 382.986101][T16937] loop1: detected capacity change from 0 to 2048 [ 383.035705][T16937] loop1: detected capacity change from 0 to 2048 [ 383.054042][T16937] loop1: detected capacity change from 0 to 2048 [ 383.099039][T16937] loop1: detected capacity change from 0 to 2048 [ 383.148488][T16937] loop1: detected capacity change from 0 to 2048 04:59:33 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:33 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:33 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68) 04:59:33 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, &(0x7f0000000000), 0x0) 04:59:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext, 0x81002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) getuid() (async, rerun: 64) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[], 0x1, 0x541, &(0x7f0000000d40)="$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") (async) r0 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) (async) sendfile(r0, r1, 0x0, 0x7fffff67) 04:59:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, &(0x7f0000000000), 0x0) 04:59:34 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) [ 383.228514][T16957] loop4: detected capacity change from 0 to 256 [ 383.229856][T16963] loop0: detected capacity change from 0 to 256 04:59:34 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68) 04:59:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, &(0x7f0000000000), 0x0) 04:59:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) 04:59:34 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, &(0x7f0000000000)=[{0x0}], 0x1) 04:59:34 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/104, 0x68) [ 383.349315][T16978] loop4: detected capacity change from 0 to 256 [ 383.364935][T16985] loop1: detected capacity change from 0 to 2048 [ 383.371787][T16987] loop0: detected capacity change from 0 to 256 [ 383.444233][T16991] loop4: detected capacity change from 0 to 256 04:59:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, &(0x7f0000000000)=[{0x0}], 0x1) 04:59:34 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:34 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) 04:59:34 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") chdir(0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:34 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 04:59:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') readv(r0, &(0x7f0000000000)=[{0x0}], 0x1) 04:59:34 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:34 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) [ 383.546205][T16997] loop0: detected capacity change from 0 to 256 [ 383.555579][T16998] loop4: detected capacity change from 0 to 256 [ 383.652418][T17011] loop0: detected capacity change from 0 to 256 04:59:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() (async) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (async) sendfile(r1, r2, 0x0, 0x7fffff67) 04:59:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_DFS_REGION={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) bind$netlink(r0, 0x0, 0x0) sendmsg$netlink(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) 04:59:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:34 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 04:59:34 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, 0x0) [ 383.814808][T16985] syz-executor.1: attempt to access beyond end of device [ 383.814808][T16985] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:34 executing program 3: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r6, 0x0, 0x0}) io_uring_enter(r6, 0x2d3e, 0x0, 0x0, 0x0, 0x0) [ 383.860558][T17023] loop4: detected capacity change from 0 to 256 [ 383.926987][T17028] loop1: detected capacity change from 0 to 2048 [ 384.215524][T17033] syz-executor.1: attempt to access beyond end of device [ 384.215524][T17033] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 384.229772][T17028] syz-executor.1: attempt to access beyond end of device [ 384.229772][T17028] loop1: rw=34817, sector=2048, nr_sectors = 2 limit=2048 04:59:35 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) 04:59:35 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, 0x0) 04:59:35 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") rename(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f00000026c0)='./file1\x00') rmdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 04:59:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) bind$netlink(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 04:59:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") (async) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) 04:59:35 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', '.', [{0x20, 'nl80211\x00'}, {0x20, '.\xe4-+'}, {0x20, '\x91\''}, {0x20, 'wlan1\x00'}, {0x20, ':'}], 0xa, "6f75c087ea4e3e8614e75c2f9e11b536d5547f5aaa01966fe8872a5a"}, 0x3b) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="01e5ff000004000004003b1c210008000300", @ANYRES32=r2, @ANYBLOB="2c0433005000de295b3acba52ee4080211000001505050505050"], 0x448}}, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000240)=ANY=[], 0x3af4701e) sendfile(r5, r4, 0x0, 0x10000a006) 04:59:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f00000006c0)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xca0, 0x8, 0x0, 0x1, [{0xa10, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x1d8, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x26}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x5c, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x238, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x44}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x548, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x10}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x8}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x258, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "80519ee09bcc7eca031f1842a075a5f26aeeb0be2f2e517f4a54fe410b37a029"}, @WGPEER_A_ALLOWEDIPS={0x220, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}]}]}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PEERS={0x20c, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_FLAGS={0x8}]}, {0x1f4, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "91a14b7f2ff70b40dd2c2d493b8d135e8d35fdc12a11fe95861754b5792b4c7e"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, @WGPEER_A_ALLOWEDIPS={0x194, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}]}]}]}]}, 0xec8}}, 0x0) 04:59:35 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) io_uring_setup(0x37db, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, 0x0) [ 384.442333][T17038] loop4: detected capacity change from 0 to 256 04:59:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x3) sched_setscheduler(r1, 0x3, &(0x7f0000000180)=0x800) perf_event_open(&(0x7f0000000200)={0x193b7196c508fb12, 0x80, 0x81, 0xfc, 0x9, 0xa1, 0x0, 0x12, 0x21c88, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0x9}, 0x4000, 0x21, 0x7fff, 0x2, 0x5, 0x3, 0x891, 0x0, 0x200}, r1, 0x10, 0xffffffffffffffff, 0xa) r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffff67) 04:59:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:35 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) 04:59:35 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r7) 04:59:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="a1e5ff0000040000040094a3210008000300", @ANYRES32=r2, @ANYBLOB="2c0433"], 0x448}}, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000240)=ANY=[], 0x3af4701e) sendfile(r5, r4, 0x0, 0x10000a006) 04:59:35 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) [ 384.584435][T17059] loop1: detected capacity change from 0 to 2048 [ 384.611555][ T27] audit: type=1400 audit(1699678775.385:395): avc: denied { write } for pid=17066 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 04:59:35 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r7) 04:59:35 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, 0x0, 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:35 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r7) [ 384.804823][T17087] loop0: detected capacity change from 0 to 256 04:59:35 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, 0x0, 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:35 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:35 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) [ 384.947863][T17098] loop0: detected capacity change from 0 to 256 04:59:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() (async) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") getpid() (async) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x3) sched_setscheduler(r1, 0x3, &(0x7f0000000180)=0x800) (async) sched_setscheduler(r1, 0x3, &(0x7f0000000180)=0x800) perf_event_open(&(0x7f0000000200)={0x193b7196c508fb12, 0x80, 0x81, 0xfc, 0x9, 0xa1, 0x0, 0x12, 0x21c88, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0x9}, 0x4000, 0x21, 0x7fff, 0x2, 0x5, 0x3, 0x891, 0x0, 0x200}, r1, 0x10, 0xffffffffffffffff, 0xa) r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffff67) 04:59:35 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:35 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, 0x0, 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:35 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) [ 385.076767][T17059] syz-executor.1: attempt to access beyond end of device [ 385.076767][T17059] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 385.113488][T17107] loop0: detected capacity change from 0 to 256 [ 385.165109][T17111] loop1: detected capacity change from 0 to 2048 04:59:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000001200)={'batadv0\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x11, 0x806, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) 04:59:36 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:36 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000003400), 0x4) 04:59:36 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:36 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001700)={&(0x7f00000006c0)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xca0, 0x8, 0x0, 0x1, [{0xa10, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x1d8, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x5c, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x238, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x548, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x258, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "80519ee09bcc7eca031f1842a075a5f26aeeb0be2f2e517f4a54fe410b37a029"}, @WGPEER_A_ALLOWEDIPS={0x220, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}]}]}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PEERS={0x20c, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_FLAGS={0x8}]}, {0x1f4, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "91a14b7f2ff70b40dd2c2d493b8d135e8d35fdc12a11fe95861754b5792b4c7e"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_ALLOWEDIPS={0x194, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}]}]}]}, 0xec8}}, 0x0) 04:59:36 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040), &(0x7f0000000100)) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r5 = io_uring_setup(0x37db, &(0x7f0000000240)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r6) [ 385.328803][T17119] loop0: detected capacity change from 0 to 256 04:59:36 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') [ 385.448034][T17132] loop0: detected capacity change from 0 to 256 04:59:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x3) sched_setscheduler(r1, 0x3, &(0x7f0000000180)=0x800) perf_event_open(&(0x7f0000000200)={0x193b7196c508fb12, 0x80, 0x81, 0xfc, 0x9, 0xa1, 0x0, 0x12, 0x21c88, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0x9}, 0x4000, 0x21, 0x7fff, 0x2, 0x5, 0x3, 0x891, 0x0, 0x200}, r1, 0x10, 0xffffffffffffffff, 0xa) (async) r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) (async) sendfile(r2, r3, 0x0, 0x7fffff67) 04:59:36 executing program 3: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6873d915e8f5bd56}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 04:59:36 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040), &(0x7f0000000100)) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r5 = io_uring_setup(0x37db, &(0x7f0000000240)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r6) 04:59:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000100)={0x10}, 0x10}], 0x1, &(0x7f0000001b00)=[@cred={{0x1c}}], 0x20}, 0x0) 04:59:36 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:36 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000001080)={0x10, 0x0, 0x0, 0x100000}, 0xc) 04:59:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@dellink={0x24, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x0) 04:59:36 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') [ 385.515273][T17111] syz-executor.1: attempt to access beyond end of device [ 385.515273][T17111] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 385.551002][T17137] loop0: detected capacity change from 0 to 256 04:59:36 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040), &(0x7f0000000100)) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r5 = io_uring_setup(0x37db, &(0x7f0000000240)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r6) 04:59:36 executing program 4: syz_open_dev$vcsn(&(0x7f0000000140), 0x7, 0x511482) 04:59:36 executing program 3: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x48) [ 385.622591][T17152] loop0: detected capacity change from 0 to 256 [ 385.633230][T17145] loop1: detected capacity change from 0 to 2048 04:59:36 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) write$binfmt_elf32(r0, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x9, 0x8d, 0x6, 0x0, 0x3, 0x6, 0x200, 0x3c1, 0x38, 0x48, 0x3, 0x0, 0x20, 0x2, 0x8, 0x7fff, 0x8}, [{0x3, 0x4, 0x1, 0xffffffff, 0x3, 0xffffc32d, 0x3f, 0x589}], "a08f3983a5717437ef8d89fda8f800b72bdf858b14c8a8468178b5d1d4e015daf6fd9d59aaf57c42fc3207b1f5865173a7c50c32f0326a3b0e", ['\x00', '\x00', '\x00', '\x00']}, 0x491) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000280)={'veth0_to_team\x00', 0x1000}) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0xfffffffffffffec4, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfff}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x2a}, 0x1, 0x0, 0x0, 0x20000010}, 0x4804) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x90, 0x30, 0x1, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0xb}], [@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000001400)=0x0, &(0x7f0000001440)=0x4) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001580)={'syztnl2\x00', &(0x7f0000001480)={'syztnl2\x00', r3, 0x7800, 0x40, 0x1, 0x0, {{0x37, 0x4, 0x1, 0x34, 0xdc, 0x67, 0x0, 0x3f, 0x29, 0x0, @private=0xa010100, @multicast2, {[@ssrr={0x89, 0x27, 0x51, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast, @remote, @rand_addr=0x64010102, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x38}]}, @end, @lsrr={0x83, 0x7, 0xdf, [@multicast2]}, @cipso={0x86, 0x1a, 0x3, [{0x1, 0x5, "f92977"}, {0x5, 0xf, "bddbb37d805a4fcdfe9316a415"}]}, @end, @timestamp_addr={0x44, 0x2c, 0xe0, 0x1, 0x4, [{@broadcast, 0x2}, {@loopback, 0x9}, {@remote, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@rand_addr=0x64010101, 0x9}]}, @ssrr={0x89, 0xb, 0x6c, [@empty, @rand_addr=0x64010102]}, @timestamp={0x44, 0xc, 0x40, 0x0, 0x4, [0x30000000, 0xcef]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x34, 0x94, 0x1, 0xf, [{@broadcast, 0x7}, {@loopback, 0xa6}, {@empty, 0x3}, {@multicast2, 0x8}, {@multicast2, 0x70e}, {@dev={0xac, 0x14, 0x14, 0x3f}}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f00000015c0)={'wg2\x00', 0x0}) getsockname$packet(r0, &(0x7f0000001600)={0x11, 0x0, 0x0}, &(0x7f0000001640)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r11, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r12}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000001ec0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001e80)={&(0x7f0000001680)={0x7c4, 0x0, 0x1, 0x70bd28, 0x25dfdbfc, {}, [{{0x8}, {0x220, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xec2}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ad74d3e}}}]}}, {{0x8, 0x1, r7}, {0x19c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x94}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xff}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r9}, {0x4}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r3}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x101, 0x18, 0x20, 0x7}, {0x9b2, 0x1, 0x40, 0xd3}, {0x8001, 0x1f, 0x1, 0x6}, {0x4, 0x6, 0x8, 0x4}, {0x3, 0xb4, 0x8, 0x6}, {0x0, 0x3, 0x3f, 0x401}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x69cb}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x7c4}, 0x1, 0x0, 0x0, 0x40}, 0x24000000) write$binfmt_script(r5, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'msdos\x00'}, {0x20, 'veth0_to_team\x00'}, {0x20, '/\x94!'}, {0x20, '{*+\x1e}}%-'}, {0x20, 'veth0_to_team\x00'}, {0x20, 'msdos\x00'}, {0x20, '{'}, {0x20, '-^'}, {0x20, '[*'}, {0x20, '\xc7'}], 0xa, "e4ea1eb08692dfee169b7060cdc1f7f6eb"}, 0x5f) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x1b33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x420, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r13, @ANYRESHEX=r13, @ANYRES32=r13], 0x1, 0x53a, &(0x7f0000000800)="$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") r14 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r15 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r14, &(0x7f0000000600)="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", 0x200) sendfile(r14, r15, 0x0, 0x7fffff67) sendmsg$nl_xfrm(r14, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0x160}}, 0x80) 04:59:36 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:36 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000001c0)="a3", 0x0}, 0x50) 04:59:36 executing program 3: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000280)) fcntl$getownex(r0, 0x407, 0x0) 04:59:36 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}) io_uring_enter(0xffffffffffffffff, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r4 = io_uring_setup(0x37db, &(0x7f0000000240)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0x18, 0x20000000, r5) 04:59:36 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000100)=0x13, 0x4) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) [ 385.737224][T17163] loop0: detected capacity change from 0 to 256 04:59:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x508, 0x348, 0xc8, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x30}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568) 04:59:36 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}) io_uring_enter(0xffffffffffffffff, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r4 = io_uring_setup(0x37db, &(0x7f0000000240)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0x18, 0x20000000, r5) 04:59:36 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') [ 385.797223][T17166] loop1: detected capacity change from 0 to 2048 [ 385.815571][T17177] loop0: detected capacity change from 0 to 256 [ 385.823422][T17178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17178 comm=syz-executor.4 04:59:36 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:36 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x41, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:36 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}) io_uring_enter(0xffffffffffffffff, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r4 = io_uring_setup(0x37db, &(0x7f0000000240)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0x18, 0x20000000, r5) 04:59:36 executing program 3: r0 = socket(0x11, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x107, 0x16, 0x0, 0x0) 04:59:36 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3a, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) [ 385.919166][T17191] loop0: detected capacity change from 0 to 256 04:59:37 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) (async) write$binfmt_elf32(r0, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x9, 0x8d, 0x6, 0x0, 0x3, 0x6, 0x200, 0x3c1, 0x38, 0x48, 0x3, 0x0, 0x20, 0x2, 0x8, 0x7fff, 0x8}, [{0x3, 0x4, 0x1, 0xffffffff, 0x3, 0xffffc32d, 0x3f, 0x589}], "a08f3983a5717437ef8d89fda8f800b72bdf858b14c8a8468178b5d1d4e015daf6fd9d59aaf57c42fc3207b1f5865173a7c50c32f0326a3b0e", ['\x00', '\x00', '\x00', '\x00']}, 0x491) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000280)={'veth0_to_team\x00', 0x1000}) (async) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0xfffffffffffffec4, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfff}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x2a}, 0x1, 0x0, 0x0, 0x20000010}, 0x4804) (async) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x90, 0x30, 0x1, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0xb}], [@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000001400)=0x0, &(0x7f0000001440)=0x4) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001580)={'syztnl2\x00', &(0x7f0000001480)={'syztnl2\x00', r3, 0x7800, 0x40, 0x1, 0x0, {{0x37, 0x4, 0x1, 0x34, 0xdc, 0x67, 0x0, 0x3f, 0x29, 0x0, @private=0xa010100, @multicast2, {[@ssrr={0x89, 0x27, 0x51, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast, @remote, @rand_addr=0x64010102, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x38}]}, @end, @lsrr={0x83, 0x7, 0xdf, [@multicast2]}, @cipso={0x86, 0x1a, 0x3, [{0x1, 0x5, "f92977"}, {0x5, 0xf, "bddbb37d805a4fcdfe9316a415"}]}, @end, @timestamp_addr={0x44, 0x2c, 0xe0, 0x1, 0x4, [{@broadcast, 0x2}, {@loopback, 0x9}, {@remote, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@rand_addr=0x64010101, 0x9}]}, @ssrr={0x89, 0xb, 0x6c, [@empty, @rand_addr=0x64010102]}, @timestamp={0x44, 0xc, 0x40, 0x0, 0x4, [0x30000000, 0xcef]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x34, 0x94, 0x1, 0xf, [{@broadcast, 0x7}, {@loopback, 0xa6}, {@empty, 0x3}, {@multicast2, 0x8}, {@multicast2, 0x70e}, {@dev={0xac, 0x14, 0x14, 0x3f}}]}]}}}}}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f00000015c0)={'wg2\x00', 0x0}) getsockname$packet(r0, &(0x7f0000001600)={0x11, 0x0, 0x0}, &(0x7f0000001640)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) (async) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r11, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r12}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000001ec0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001e80)={&(0x7f0000001680)={0x7c4, 0x0, 0x1, 0x70bd28, 0x25dfdbfc, {}, [{{0x8}, {0x220, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xec2}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ad74d3e}}}]}}, {{0x8, 0x1, r7}, {0x19c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x94}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xff}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r9}, {0x4}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r3}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x101, 0x18, 0x20, 0x7}, {0x9b2, 0x1, 0x40, 0xd3}, {0x8001, 0x1f, 0x1, 0x6}, {0x4, 0x6, 0x8, 0x4}, {0x3, 0xb4, 0x8, 0x6}, {0x0, 0x3, 0x3f, 0x401}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x69cb}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x7c4}, 0x1, 0x0, 0x0, 0x40}, 0x24000000) write$binfmt_script(r5, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'msdos\x00'}, {0x20, 'veth0_to_team\x00'}, {0x20, '/\x94!'}, {0x20, '{*+\x1e}}%-'}, {0x20, 'veth0_to_team\x00'}, {0x20, 'msdos\x00'}, {0x20, '{'}, {0x20, '-^'}, {0x20, '[*'}, {0x20, '\xc7'}], 0xa, "e4ea1eb08692dfee169b7060cdc1f7f6eb"}, 0x5f) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x1b33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x420, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r13, @ANYRESHEX=r13, @ANYRES32=r13], 0x1, 0x53a, &(0x7f0000000800)="$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") (async) r14 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async) r15 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r14, &(0x7f0000000600)="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", 0x200) (async) sendfile(r14, r15, 0x0, 0x7fffff67) (async) sendmsg$nl_xfrm(r14, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0x160}}, 0x80) 04:59:37 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x8}, 0x0, 0x0) 04:59:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:37 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:37 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) [ 386.224337][T17166] syz-executor.1: attempt to access beyond end of device [ 386.224337][T17166] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f00000014c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 04:59:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) write$binfmt_elf32(r0, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x9, 0x8d, 0x6, 0x0, 0x3, 0x6, 0x200, 0x3c1, 0x38, 0x48, 0x3, 0x0, 0x20, 0x2, 0x8, 0x7fff, 0x8}, [{0x3, 0x4, 0x1, 0xffffffff, 0x3, 0xffffc32d, 0x3f, 0x589}], "a08f3983a5717437ef8d89fda8f800b72bdf858b14c8a8468178b5d1d4e015daf6fd9d59aaf57c42fc3207b1f5865173a7c50c32f0326a3b0e", ['\x00', '\x00', '\x00', '\x00']}, 0x491) (async) write$binfmt_elf32(r0, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x9, 0x8d, 0x6, 0x0, 0x3, 0x6, 0x200, 0x3c1, 0x38, 0x48, 0x3, 0x0, 0x20, 0x2, 0x8, 0x7fff, 0x8}, [{0x3, 0x4, 0x1, 0xffffffff, 0x3, 0xffffc32d, 0x3f, 0x589}], "a08f3983a5717437ef8d89fda8f800b72bdf858b14c8a8468178b5d1d4e015daf6fd9d59aaf57c42fc3207b1f5865173a7c50c32f0326a3b0e", ['\x00', '\x00', '\x00', '\x00']}, 0x491) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) (async) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000280)={'veth0_to_team\x00', 0x1000}) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0xfffffffffffffec4, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfff}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x2a}, 0x1, 0x0, 0x0, 0x20000010}, 0x4804) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x90, 0x30, 0x1, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0xb}], [@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) (async) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x90, 0x30, 0x1, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0xb}], [@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x4) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000001400)=0x0, &(0x7f0000001440)=0x4) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001580)={'syztnl2\x00', &(0x7f0000001480)={'syztnl2\x00', r3, 0x7800, 0x40, 0x1, 0x0, {{0x37, 0x4, 0x1, 0x34, 0xdc, 0x67, 0x0, 0x3f, 0x29, 0x0, @private=0xa010100, @multicast2, {[@ssrr={0x89, 0x27, 0x51, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast, @remote, @rand_addr=0x64010102, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x38}]}, @end, @lsrr={0x83, 0x7, 0xdf, [@multicast2]}, @cipso={0x86, 0x1a, 0x3, [{0x1, 0x5, "f92977"}, {0x5, 0xf, "bddbb37d805a4fcdfe9316a415"}]}, @end, @timestamp_addr={0x44, 0x2c, 0xe0, 0x1, 0x4, [{@broadcast, 0x2}, {@loopback, 0x9}, {@remote, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@rand_addr=0x64010101, 0x9}]}, @ssrr={0x89, 0xb, 0x6c, [@empty, @rand_addr=0x64010102]}, @timestamp={0x44, 0xc, 0x40, 0x0, 0x4, [0x30000000, 0xcef]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x34, 0x94, 0x1, 0xf, [{@broadcast, 0x7}, {@loopback, 0xa6}, {@empty, 0x3}, {@multicast2, 0x8}, {@multicast2, 0x70e}, {@dev={0xac, 0x14, 0x14, 0x3f}}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f00000015c0)={'wg2\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f00000015c0)={'wg2\x00', 0x0}) getsockname$packet(r0, &(0x7f0000001600)={0x11, 0x0, 0x0}, &(0x7f0000001640)=0x14) socket$nl_route(0x10, 0x3, 0x0) (async) r10 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r11, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r11, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r12}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) (async) sendmsg$nl_route(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_getlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r12}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x8}]}, @IFLA_LINKMODE={0x5}]}, 0x30}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000001ec0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001e80)={&(0x7f0000001680)={0x7c4, 0x0, 0x1, 0x70bd28, 0x25dfdbfc, {}, [{{0x8}, {0x220, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xec2}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ad74d3e}}}]}}, {{0x8, 0x1, r7}, {0x19c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x94}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xff}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r9}, {0x4}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r3}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x101, 0x18, 0x20, 0x7}, {0x9b2, 0x1, 0x40, 0xd3}, {0x8001, 0x1f, 0x1, 0x6}, {0x4, 0x6, 0x8, 0x4}, {0x3, 0xb4, 0x8, 0x6}, {0x0, 0x3, 0x3f, 0x401}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x69cb}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x7c4}, 0x1, 0x0, 0x0, 0x40}, 0x24000000) write$binfmt_script(r5, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'msdos\x00'}, {0x20, 'veth0_to_team\x00'}, {0x20, '/\x94!'}, {0x20, '{*+\x1e}}%-'}, {0x20, 'veth0_to_team\x00'}, {0x20, 'msdos\x00'}, {0x20, '{'}, {0x20, '-^'}, {0x20, '[*'}, {0x20, '\xc7'}], 0xa, "e4ea1eb08692dfee169b7060cdc1f7f6eb"}, 0x5f) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x1b33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x420, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r13, @ANYRESHEX=r13, @ANYRES32=r13], 0x1, 0x53a, &(0x7f0000000800)="$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") r14 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) r15 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r14, &(0x7f0000000600)="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", 0x200) sendfile(r14, r15, 0x0, 0x7fffff67) sendmsg$nl_xfrm(r14, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0x160}}, 0x80) 04:59:37 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:37 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') [ 386.281166][T17211] loop0: detected capacity change from 0 to 256 04:59:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x10, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:37 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:37 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:37 executing program 4: syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0x1e4c0) [ 386.362989][T17229] loop0: detected capacity change from 0 to 256 [ 386.377644][T17223] loop1: detected capacity change from 0 to 2048 [ 386.680102][T17223] syz-executor.1: attempt to access beyond end of device [ 386.680102][T17223] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x11, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 04:59:37 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001800)=@base={0x6, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x48) 04:59:37 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:37 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRESHEX=r1, @ANYRES32=r1], 0x1, 0x53a, &(0x7f0000000800)="$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") r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffff67) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) 04:59:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x41, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x150, 0x308, 0x150, 0x150, 0x150, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'veth0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'veth1_vlan\x00', 'gretap0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) 04:59:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x508, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xc8}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x30}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568) 04:59:37 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:37 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') [ 387.127933][T17245] loop0: detected capacity change from 0 to 256 [ 387.144853][T17246] loop1: detected capacity change from 0 to 2048 04:59:37 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 04:59:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x508, 0x348, 0xf0, 0xffffffff, 0xf0, 0x0, 0x258, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@ipv6={@private0, @local, [], [], 'macvtap0\x00', 'dvmrp0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@loopback, @ipv6=@private1, @gre_key}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hbh={{0x48}}, @common=@frag={{0x30}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}, {{@ipv6={@empty, @private0, [], [], 'ip6gre0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@private0, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv4=@dev, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568) 04:59:38 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:38 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:38 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:38 executing program 3: syz_clone(0x4080200, 0x0, 0x0, 0x0, 0x0, 0x0) 04:59:38 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) [ 387.245611][T17265] loop0: detected capacity change from 0 to 256 [ 387.345095][T17280] loop0: detected capacity change from 0 to 256 04:59:38 executing program 5: syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:38 executing program 4: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000008c0)) 04:59:38 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, 0x0, 0xfd3e) 04:59:38 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRESHEX=r1, @ANYRES32=r1], 0x1, 0x53a, &(0x7f0000000800)="$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") r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) (async) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffff67) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) 04:59:38 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) [ 387.593686][T17246] syz-executor.1: attempt to access beyond end of device [ 387.593686][T17246] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'macvtap0\x00', @ifru_mtu}) [ 387.642391][T17293] loop0: detected capacity change from 0 to 256 04:59:38 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:38 executing program 5: syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:38 executing program 3: pipe2(0x0, 0x900) [ 387.699807][T17299] loop1: detected capacity change from 0 to 2048 04:59:38 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:38 executing program 4: syz_genetlink_get_family_id$net_dm(&(0x7f0000000780), 0xffffffffffffffff) 04:59:38 executing program 5: syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) [ 387.779000][T17308] loop0: detected capacity change from 0 to 256 04:59:38 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:38 executing program 4: socketpair(0x3, 0x0, 0x800, &(0x7f0000000000)) 04:59:38 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14, &(0x7f0000000140)={0x0}}, 0x0) [ 387.904161][T17326] loop0: detected capacity change from 0 to 256 04:59:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRESHEX=r1, @ANYRES32=r1], 0x1, 0x53a, &(0x7f0000000800)="$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") r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffff67) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getuid() (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRESHEX=r1, @ANYRES32=r1], 0x1, 0x53a, &(0x7f0000000800)="$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") (async) open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) write(r2, &(0x7f0000000600)="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", 0x200) (async) sendfile(r2, r3, 0x0, 0x7fffff67) (async) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) (async) 04:59:38 executing program 3: syz_open_dev$rtc(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 04:59:38 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0), &(0x7f0000000640)) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1]) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r5 = io_uring_setup(0x37db, &(0x7f0000000240)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0x18, 0x20000000, r6) 04:59:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140), &(0x7f0000000100)=0x4) 04:59:38 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:38 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:38 executing program 3: r0 = socket(0x1, 0x2, 0x0) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x20) 04:59:38 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000cc0), 0x4) [ 388.072532][T17299] syz-executor.1: attempt to access beyond end of device [ 388.072532][T17299] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 388.112724][T17335] loop0: detected capacity change from 0 to 256 04:59:38 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0), &(0x7f0000000640)) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1]) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r5 = io_uring_setup(0x37db, &(0x7f0000000240)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0x18, 0x20000000, r6) 04:59:38 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:38 executing program 4: pipe2(&(0x7f0000000900), 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 04:59:39 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) sendto(r0, 0x0, 0x0, 0x2004000, 0x0, 0x42) [ 388.216919][T17351] loop0: detected capacity change from 0 to 256 [ 388.219369][T17343] loop1: detected capacity change from 0 to 2048 04:59:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x4000, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES8, @ANYRES32=r1], 0x1, 0x53a, &(0x7f0000000d40)="$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") r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffff67) 04:59:39 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:39 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0), &(0x7f0000000640)) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1]) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r5 = io_uring_setup(0x37db, &(0x7f0000000240)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0x18, 0x20000000, r6) 04:59:39 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000010c0)='ns/ipc\x00') 04:59:39 executing program 4: select(0x40, &(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)={0x0, 0x2710}) 04:59:39 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:39 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x100076}, 0x20) 04:59:39 executing program 5: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(0xffffffffffffffff, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0]) r1 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r1, 0x0, 0x0}) io_uring_enter(r1, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r4 = io_uring_setup(0x37db, &(0x7f0000000240)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0x18, 0x20000000, r5) [ 388.331671][T17364] loop0: detected capacity change from 0 to 256 04:59:39 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, 0x0, 0x0) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={0x0}}, 0x20000040) 04:59:39 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@x25, 0x80) 04:59:39 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f00000006c0), 0x1ff, 0x802) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) [ 388.416429][T17372] loop1: detected capacity change from 0 to 2048 [ 388.441837][T17384] loop0: detected capacity change from 0 to 256 [ 388.448524][T17372] FAT-fs (loop1): Unrecognized mount option "" or missing value 04:59:39 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:39 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000080)={@multicast, @random="9f71c5e19cff", @void, {@ipv4={0x800, @udp={{0x8, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @private=0xa010101, {[@rr={0x7, 0x3, 0x6f}, @ssrr={0x89, 0x3, 0x74}, @lsrr={0x83, 0x3, 0x4c}]}}, {0x0, 0x0, 0x18, 0x0, @wg=@data}}}}}, 0x0) 04:59:39 executing program 5: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(0xffffffffffffffff, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0]) r1 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r1, 0x0, 0x0}) io_uring_enter(r1, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r4 = io_uring_setup(0x37db, &(0x7f0000000240)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0x18, 0x20000000, r5) 04:59:39 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, 0x0, 0x0) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x4000, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES8, @ANYRES32=r1], 0x1, 0x53a, &(0x7f0000000d40)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") (async) r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffff67) 04:59:39 executing program 4: syz_emit_ethernet(0x12, &(0x7f0000000280)={@multicast, @broadcast, @void, {@generic={0x0, "2ecfde21"}}}, 0x0) 04:59:39 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x0, 0x5, &(0x7f0000000a80)=@raw=[@tail_call], 0x0}, 0x90) 04:59:39 executing program 3: r0 = socket(0x1e, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x89a0, &(0x7f0000000040)) 04:59:39 executing program 5: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(0xffffffffffffffff, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0]) r1 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r1, 0x0, 0x0}) io_uring_enter(r1, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r4 = io_uring_setup(0x37db, &(0x7f0000000240)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0x18, 0x20000000, r5) [ 388.539162][T17394] loop0: detected capacity change from 0 to 256 04:59:39 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, 0x0, 0x0) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:39 executing program 3: syz_emit_ethernet(0x1f, &(0x7f0000000100)={@multicast, @empty, @void, {@llc_tr={0x11, {@snap={0x0, 0xab, "dc", "d59999", 0x0, "a916562de17ee8f5aa"}}}}}, 0x0) 04:59:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 388.596196][T17400] loop1: detected capacity change from 0 to 2048 [ 388.630150][T17400] FAT-fs (loop1): Unrecognized mount option "ÿÿÿÿÿ" or missing value 04:59:39 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:39 executing program 4: r0 = socket(0x10, 0x2, 0x0) connect$l2tp6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private1}, 0x20) 04:59:39 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) 04:59:39 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) [ 388.656271][T17413] loop0: detected capacity change from 0 to 256 04:59:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x4000, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES8, @ANYRES32=r1], 0x1, 0x53a, &(0x7f0000000d40)="$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") (async, rerun: 64) r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (rerun: 64) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffff67) 04:59:39 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000cc0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 04:59:39 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200), 0x0) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:39 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:39 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ff1000/0x3000)=nil) 04:59:39 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000440)) [ 388.785094][T17435] loop0: detected capacity change from 0 to 256 [ 388.798803][T17430] loop1: detected capacity change from 0 to 2048 04:59:39 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:39 executing program 4: keyctl$dh_compute(0x17, &(0x7f0000000180), &(0x7f00000001c0)=""/162, 0xa2, &(0x7f0000000380)={0x0, &(0x7f00000002c0)="ab74bfd2c2fade2efec69f43ef66389a8d26635bc201f5276cfccc39d86877fc39ae32f4e6dd3bff1452480aa6c9c533438f5664a3d071d651ef022d068784c21e", 0x41}) [ 388.826898][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value 04:59:39 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:39 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200), 0x0) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:39 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000180)) 04:59:39 executing program 4: syz_emit_ethernet(0x22, &(0x7f0000000000)={@link_local, @broadcast, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @link_local}}}}, 0x0) [ 388.889520][T17430] loop1: detected capacity change from 0 to 2048 [ 388.896125][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value [ 388.955320][T17430] loop1: detected capacity change from 0 to 2048 [ 388.980929][T17457] loop0: detected capacity change from 0 to 256 [ 388.989115][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value [ 389.060534][T17430] loop1: detected capacity change from 0 to 2048 [ 389.067303][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value [ 389.122474][T17430] loop1: detected capacity change from 0 to 2048 [ 389.129147][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value [ 389.168529][T17430] loop1: detected capacity change from 0 to 2048 [ 389.175007][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value [ 389.228499][T17430] loop1: detected capacity change from 0 to 2048 [ 389.235307][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value [ 389.288265][T17430] loop1: detected capacity change from 0 to 2048 [ 389.294921][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value [ 389.357192][T17430] loop1: detected capacity change from 0 to 2048 [ 389.364218][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value [ 389.407364][T17430] loop1: detected capacity change from 0 to 2048 [ 389.414179][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value [ 389.459950][T17430] loop1: detected capacity change from 0 to 2048 [ 389.466726][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value [ 389.507328][T17430] loop1: detected capacity change from 0 to 2048 [ 389.514010][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value 04:59:40 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={@cgroup, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 04:59:40 executing program 4: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@multicast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, 'T\x00', 0x24, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[@fragment], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, 0x0) 04:59:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) 04:59:40 executing program 5: r0 = syz_io_uring_setup(0x24f7, 0x0, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:40 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200), 0x0) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file2\x00') 04:59:40 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) [ 389.568703][T17430] loop1: detected capacity change from 0 to 2048 [ 389.575311][T17430] FAT-fs (loop1): Unrecognized mount option "" or missing value 04:59:40 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x6004, 0x1) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0x4c00, 0x0) 04:59:40 executing program 3: r0 = socket(0x1, 0x2, 0x0) getpeername$l2tp6(r0, 0x0, 0x0) 04:59:40 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000580)='ns/user\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 04:59:40 executing program 5: r0 = syz_io_uring_setup(0x24f7, 0x0, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) [ 389.661713][T17471] loop0: detected capacity change from 0 to 256 04:59:40 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_SE_IO(r0, &(0x7f0000001180)={&(0x7f0000001480), 0xc, &(0x7f0000001140)={&(0x7f00000014c0)={0x10b4, 0x0, 0x0, 0x0, 0x0, {}, [@NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_SE_INDEX, @NFC_ATTR_DEVICE_INDEX, @NFC_ATTR_DEVICE_INDEX, @NFC_ATTR_DEVICE_INDEX={0x2}, @NFC_ATTR_SE_APDU={0x0, 0x19, "662d4c170df34caea407b9e2c2c7c889f833b89f09f73a3d63396a726d9ae294e7c6f9abc3316eaf8c30864087c29b794f748cd2f815573e9ee4d99e1b10de72f33742ee1807edf5de9b71bc3b01662ec6ef24d2dda1a924a1133a90aaaafe652fbf49b9b8a93cae951f41c8911bc64fcf1b501cf881dee7d419a11f71f62e168205e5ba73943ed084d2a437fbb519e1ae2b3622bc92828a4f"}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x10b4}}, 0x0) 04:59:40 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(0x0, &(0x7f0000000100)='./file2\x00') 04:59:40 executing program 4: r0 = socket(0x11, 0x2, 0x0) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x53, r0, 0x0) [ 389.716818][T17473] loop1: detected capacity change from 0 to 2048 [ 389.780516][T17487] loop0: detected capacity change from 0 to 256 [ 389.785066][ T27] audit: type=1400 audit(1699678780.555:396): avc: denied { map } for pid=17482 comm="syz-executor.4" path="socket:[50104]" dev="sockfs" ino=50104 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 04:59:40 executing program 5: r0 = syz_io_uring_setup(0x24f7, 0x0, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:40 executing program 3: syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) 04:59:40 executing program 4: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000a00)=@o_path={0x0}, 0x18) 04:59:40 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:40 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(0x0, &(0x7f0000000100)='./file2\x00') 04:59:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getuid() (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") (async) open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) write(r1, &(0x7f0000000600)="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", 0x200) (async) sendfile(r1, r2, 0x0, 0x7fffff67) (async) 04:59:40 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140), &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) [ 390.083790][T17473] syz-executor.1: attempt to access beyond end of device [ 390.083790][T17473] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:40 executing program 3: r0 = shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmdt(r0) 04:59:40 executing program 4: syz_genetlink_get_family_id$net_dm(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:59:40 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140), &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) [ 390.148046][T17499] loop0: detected capacity change from 0 to 256 04:59:41 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(0x0, &(0x7f0000000100)='./file2\x00') 04:59:41 executing program 3: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4400, &(0x7f0000000040)=ANY=[@ANYRES8=0x0], 0x1, 0x75e, &(0x7f0000001100)="$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") chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f00000002c0)={0x1, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:59:41 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000540)) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000002980)=[{0x0, 0x0, &(0x7f0000000640)}], 0x1, 0x0) 04:59:41 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140), &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) [ 390.220621][T17503] loop1: detected capacity change from 0 to 2048 04:59:41 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:41 executing program 4: syz_emit_ethernet(0x51, &(0x7f0000000680)={@multicast, @random="cf001f0800", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "78f4af", 0x1b, 0x6, 0x0, @empty, @empty, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"d7fa3d5d5d7e28"}}}}}}}, 0x0) [ 390.277312][T17513] loop3: detected capacity change from 0 to 2048 [ 390.293077][T17515] loop0: detected capacity change from 0 to 256 [ 390.336055][T17513] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:59:41 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, 0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (async) sendfile(r1, r2, 0x0, 0x7fffff67) 04:59:41 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', 0x0) [ 390.372391][T17513] ext4 filesystem being mounted at /root/syzkaller-testdir2827549144/syzkaller.g6lfMr/957/file0 supports timestamps until 2038-01-19 (0x7fffffff) 04:59:41 executing program 4: r0 = socket(0xa, 0x1, 0x0) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) 04:59:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}}}}) [ 390.451349][ T27] audit: type=1400 audit(1699678781.215:397): avc: denied { ioctl } for pid=17511 comm="syz-executor.3" path="/root/syzkaller-testdir2827549144/syzkaller.g6lfMr/957/file0/file0/file0" dev="loop3" ino=13 ioctlcmd=0x6685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 04:59:41 executing program 4: pipe2(&(0x7f0000000900), 0x80) 04:59:41 executing program 3: syz_emit_ethernet(0x17a, &(0x7f0000000280)=ANY=[@ANYBLOB="bbbbbbbbbbbb5e48498b6ca886dd69d2b59801"], 0x0) 04:59:41 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, 0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:41 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x10, &(0x7f00000002c0)=@ringbuf={{}, {}, {}, [@func]}, &(0x7f00000004c0)='syzkaller\x00'}, 0x90) 04:59:41 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x39, &(0x7f00000002c0)=@ringbuf={{}, {}, {}, [@printk, @exit, @snprintf, @ringbuf_query, @func, @snprintf, @map_fd]}, &(0x7f00000004c0)='syzkaller\x00', 0x8}, 0x90) [ 390.481405][ T27] audit: type=1400 audit(1699678781.215:398): avc: denied { map } for pid=17540 comm="syz-executor.4" path="socket:[50154]" dev="sockfs" ino=50154 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 390.512820][T17542] loop0: detected capacity change from 0 to 256 [ 390.520770][ T3121] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:59:41 executing program 3: r0 = socket(0x29, 0x2, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 04:59:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x2}, 0x48) [ 390.572181][T17549] loop1: detected capacity change from 0 to 2048 [ 390.857740][T17549] ================================================================== [ 390.865944][T17549] BUG: KCSAN: data-race in __filemap_add_folio / file_write_and_wait_range [ 390.874736][T17549] [ 390.877088][T17549] read-write to 0xffff888107ad69d0 of 8 bytes by task 17548 on cpu 0: [ 390.885273][T17549] __filemap_add_folio+0x4c1/0x730 [ 390.890564][T17549] filemap_add_folio+0x70/0x160 [ 390.895457][T17549] page_cache_ra_unbounded+0x15e/0x2e0 [ 390.900956][T17549] ondemand_readahead+0x524/0x690 [ 390.906006][T17549] page_cache_sync_ra+0x27e/0x2a0 [ 390.911151][T17549] filemap_get_pages+0x251/0xf90 [ 390.916283][T17549] filemap_splice_read+0x238/0x7f0 [ 390.919350][T17548] syz-executor.1: attempt to access beyond end of device [ 390.919350][T17548] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 390.921448][T17549] splice_direct_to_actor+0x28c/0x690 [ 390.940739][T17549] do_splice_direct+0x10d/0x190 [ 390.945865][T17549] do_sendfile+0x3c4/0x980 [ 390.950316][T17549] __x64_sys_sendfile64+0x110/0x150 [ 390.955907][T17549] do_syscall_64+0x44/0x110 [ 390.960984][T17549] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 390.967042][T17549] [ 390.969373][T17549] read to 0xffff888107ad69d0 of 8 bytes by task 17549 on cpu 1: [ 390.977799][T17549] file_write_and_wait_range+0x67/0x190 [ 390.983726][T17549] __generic_file_fsync+0x4c/0x140 [ 390.989473][T17549] fat_file_fsync+0x4c/0x100 [ 390.994084][T17549] vfs_fsync_range+0x111/0x120 [ 390.998890][T17549] generic_file_write_iter+0x191/0x1c0 [ 391.004523][T17549] do_iter_write+0x4ad/0x770 [ 391.009231][T17549] vfs_iter_write+0x56/0x70 [ 391.013750][T17549] iter_file_splice_write+0x462/0x7e0 [ 391.019165][T17549] direct_splice_actor+0x8a/0xb0 [ 391.024225][T17549] splice_direct_to_actor+0x31d/0x690 [ 391.029827][T17549] do_splice_direct+0x10d/0x190 [ 391.034715][T17549] do_sendfile+0x3c4/0x980 [ 391.039253][T17549] __x64_sys_sendfile64+0x110/0x150 [ 391.044667][T17549] do_syscall_64+0x44/0x110 [ 391.049189][T17549] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 391.055191][T17549] 04:59:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv2(r2, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/183, 0xb7}, {&(0x7f0000000100)=""/13, 0xd}], 0x2, 0x100, 0x4, 0x4) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) 04:59:41 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$eJzs3U9rE0EUAPC3WU1SD7VnEVz04qmon6AiFcSAoOSgJwUFofWil+ipR7+C31J66m0kmcR0TVobzXaJ/n6XPPbN29n5w+aUyeubHw6+dmOi3y+isxd7cVLETnTi9na+fhQLthYvAQCb4iSl+J6ytp8FALgcvv8B4P/z4uWrpw8Hg/3nVdWPOD4qptdHw/z5+Mlg/141sTOvOh6NhmXM2t7P+WE9fzWuTesf5HxV1vLduHsn58e5R88GVb2+F28bHTkAAAAAAAAAAAAAAAAAAAAAALRnt/pp4XyfSX73rHyOTp0P9Mv5Pd/ixpVzuy7XPBQAAAAAAAAAAAAAAAAAAADYWJ/6s+Dzl4M3h4fvPp4fvL8e8bs2rQYppTQezypVvekc/E3v2xdoU56eulvrG3txVipiSdVs6VfpYlbT3MKlco03rMZBEREtb8g/3FHd+up0ppPf3KMWS7bE/B3Ra/wtBAAAAAAAAAAAAAAAAAAARO1n/20/CQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0Z/7//ysGqZdvcIHGy/rduuRxAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8G/7EQAA//8HIRNR") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', 0x0) 04:59:41 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x88400, 0x0) 04:59:41 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, 0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:41 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind(r0, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @empty, 'vlan1\x00'}}, 0x80) 04:59:41 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) [ 391.057536][T17549] value changed: 0x000000000000002d -> 0x000000000000002e [ 391.064640][T17549] [ 391.067419][T17549] Reported by Kernel Concurrency Sanitizer on: [ 391.073611][T17549] CPU: 1 PID: 17549 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 391.083960][T17549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 391.094024][T17549] ================================================================== 04:59:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x11, 0x5, &(0x7f0000000a80)=@raw=[@tail_call], &(0x7f0000000b00)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c80), 0x10}, 0x90) 04:59:41 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000680)={@multicast, @random="cf001f0800", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "78f4af", 0x14, 0x6, 0x0, @empty, @empty, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x4}}}}}}}, 0x0) 04:59:41 executing program 3: bpf$MAP_CREATE(0x18, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 04:59:41 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) [ 391.143930][ T27] audit: type=1400 audit(1699678781.915:399): avc: denied { bind } for pid=17567 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 391.145451][T17575] loop0: detected capacity change from 0 to 256 04:59:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa}, 0x48) 04:59:42 executing program 3: socketpair(0x3c, 0x0, 0x0, &(0x7f0000000040)) [ 391.238156][T17583] loop1: detected capacity change from 0 to 2048 04:59:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv2(r2, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/183, 0xb7}, {&(0x7f0000000100)=""/13, 0xd}], 0x2, 0x100, 0x4, 0x4) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) (async) sendfile(r1, r2, 0x0, 0x7fffff67) 04:59:42 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200008, &(0x7f0000000500)=ANY=[], 0xfe, 0x1dd, &(0x7f00000014c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) write(r0, &(0x7f0000004200)='t', 0x1) rename(&(0x7f0000000040)='./file1\x00', 0x0) 04:59:42 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:59:42 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x8}, 0x48) 04:59:42 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:42 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@ifindex, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 04:59:42 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:42 executing program 4: pipe2(&(0x7f0000000000), 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) [ 391.547615][T17583] syz-executor.1: attempt to access beyond end of device [ 391.547615][T17583] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 391.584599][T17600] loop0: detected capacity change from 0 to 256 04:59:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={0x0}}, 0x20000000) 04:59:42 executing program 3: pipe2(0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000001bc0)) 04:59:42 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x11, 0x5, &(0x7f0000000a80)=@raw=[@tail_call], &(0x7f0000000b00)='GPL\x00', 0x2}, 0x90) [ 391.706631][T17613] loop1: detected capacity change from 0 to 2048 04:59:42 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0), &(0x7f0000000640)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv2(r2, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/183, 0xb7}, {&(0x7f0000000100)=""/13, 0xd}], 0x2, 0x100, 0x4, 0x4) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getuid() (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") (async) open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) preadv2(r2, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/183, 0xb7}, {&(0x7f0000000100)=""/13, 0xd}], 0x2, 0x100, 0x4, 0x4) (async) write(r1, &(0x7f0000000600)="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", 0x200) (async) sendfile(r1, r2, 0x0, 0x7fffff67) (async) 04:59:42 executing program 0: socket(0x23, 0x0, 0x1000003) 04:59:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@volatile, @ptr, @func]}}, 0x0, 0x3e}, 0x20) 04:59:42 executing program 4: select(0x40, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffa}, &(0x7f0000000780)={0x100000000}, &(0x7f00000007c0), &(0x7f0000000800)={0x0, 0x2710}) 04:59:42 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) [ 392.022914][T17614] syz-executor.1: attempt to access beyond end of device [ 392.022914][T17614] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 [ 392.037088][T17613] syz-executor.1: attempt to access beyond end of device [ 392.037088][T17613] loop1: rw=34817, sector=2048, nr_sectors = 1 limit=2048 04:59:42 executing program 3: r0 = socket(0x1e, 0x1, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x6, 0x2, 0x0, 0x0) 04:59:42 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "4eae25dd80a291d2acbc1ebeb75d9c784435722b55b46427828124915939b061637dc81b1cb63e65aeb5ba5a25797fd33421d76b4223af69969a2e39d9223c"}, 0x60) 04:59:42 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x13, &(0x7f0000000940)=@raw=[@snprintf, @tail_call, @generic={0x4e}], &(0x7f0000000040)='syzkaller\x00'}, 0x90) 04:59:42 executing program 3: pipe2(&(0x7f0000000000), 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) 04:59:42 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000440), r1) sendmsg$NFC_CMD_LLC_GET_PARAMS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r2, 0x225}, 0x14}}, 0x0) 04:59:42 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0), &(0x7f0000000640)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:42 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) preadv2(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/84, 0x54}], 0x1, 0x0, 0x0, 0x0) [ 392.132697][T17630] loop1: detected capacity change from 0 to 2048 04:59:42 executing program 3: add_key$user(&(0x7f0000000000), 0x0, &(0x7f0000000080)='\b', 0x1, 0xffffffffffffffff) 04:59:42 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280), r0) syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0), r0) 04:59:43 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0), &(0x7f0000000640)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0/file0\x00', 0x100, 0x40) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) [ 392.320519][T17664] loop1: detected capacity change from 0 to 2048 04:59:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001780)={0x1c, r1, 0xc09, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}}, 0x0) 04:59:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0xe, 0x0, 0x0, 0x1}, 0x48) 04:59:43 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:43 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:43 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x0, 0x5, &(0x7f0000000a80)=@raw=[@tail_call], &(0x7f0000000b00)='GPL\x00'}, 0x90) 04:59:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) [ 392.707581][T17664] syz-executor.1: attempt to access beyond end of device [ 392.707581][T17664] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:43 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:43 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ANNOUNCE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x28}}, 0x0) 04:59:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0/file0\x00', 0x100, 0x40) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) getuid() (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") (async) open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) open(&(0x7f0000000100)='./file0/file0\x00', 0x100, 0x40) (async) write(r1, &(0x7f0000000600)="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", 0x200) (async) sendfile(r1, r2, 0x0, 0x7fffff67) (async) 04:59:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0xd}, 0x48) 04:59:43 executing program 3: select(0x40, &(0x7f0000000740), 0x0, &(0x7f00000007c0)={0x1}, &(0x7f0000000800)={0x0, 0x2710}) 04:59:43 executing program 3: syz_io_uring_setup(0x6374, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) 04:59:43 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r0, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r0, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:43 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) 04:59:43 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:43 executing program 0: r0 = socket(0x22, 0x2, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), r0) 04:59:43 executing program 4: syz_io_uring_setup(0x102, &(0x7f0000000100)={0x0, 0x0, 0x2f7}, 0x0, 0x0) [ 393.089046][T17689] loop1: detected capacity change from 0 to 2048 04:59:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4}}]}}, 0x0, 0x32}, 0x20) 04:59:43 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r0, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r0, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:43 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, 0x0) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0/file0\x00', 0x100, 0x40) (async) open(&(0x7f0000000100)='./file0/file0\x00', 0x100, 0x40) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) 04:59:44 executing program 0: bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x50) 04:59:44 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x180000000) 04:59:44 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001b80)=@generic={0x0}, 0x18) [ 393.178721][ T27] audit: type=1400 audit(1699678783.955:400): avc: denied { write } for pid=17704 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 04:59:44 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, 0x0) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0), r1) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000400ec00000000000000", @ANYRES32=r2, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_1\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) 04:59:44 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r0, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r0, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}}) 04:59:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x894c, 0x0) 04:59:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') read$ptp(r0, &(0x7f0000000580)=""/244, 0xf4) 04:59:44 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRESHEX=r1, @ANYRES32=r1], 0x1, 0x53a, &(0x7f0000000800)="$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") r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000200)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe19a32d6cab057984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868271f36a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a70000d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x206) sendfile(r2, r3, 0x0, 0x7fffff67) 04:59:44 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, 0x0) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:44 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) [ 393.289607][T17724] loop1: detected capacity change from 0 to 2048 [ 393.327194][T17736] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 04:59:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x80108906, 0x0) 04:59:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') read$ptp(r0, &(0x7f0000000580)=""/244, 0xf4) 04:59:44 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') read$ptp(r0, &(0x7f0000000580)=""/244, 0xf4) [ 393.387871][T17736] bridge1: port 1(bridge_slave_1) entered blocking state [ 393.395135][T17736] bridge1: port 1(bridge_slave_1) entered disabled state [ 393.414222][T17743] loop1: detected capacity change from 0 to 2048 [ 393.431137][T17736] bridge_slave_1: entered allmulticast mode 04:59:44 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r0, 0x40603d07, 0x0) 04:59:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file1\x00', 0x8, &(0x7f0000000100)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}, {@fat=@umask={'umask', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}, {@rodir}, {@rodir}, {@fat=@errors_remount}, {@rodir}, {@numtail}, {@fat=@dos1xfloppy}, {@iocharset={'iocharset', 0x3d, 'cp865'}}, {@uni_xlate}, {@uni_xlate}, {@rodir}, {@shortname_lower}]}, 0x7, 0x35f, &(0x7f0000001940)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) 04:59:44 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRESHEX=r1, @ANYRES32=r1], 0x1, 0x53a, &(0x7f0000000800)="$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") (async) r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) write(r0, &(0x7f0000000200)="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", 0x206) sendfile(r2, r3, 0x0, 0x7fffff67) 04:59:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') read$ptp(r0, &(0x7f0000000580)=""/244, 0xf4) [ 393.453257][T17736] bridge_slave_1: entered promiscuous mode 04:59:44 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:44 executing program 3: read$ptp(0xffffffffffffffff, &(0x7f0000000580)=""/244, 0xf4) 04:59:44 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x218800, 0x0) 04:59:44 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8935, 0x0) [ 393.529772][T17759] loop4: detected capacity change from 0 to 256 04:59:44 executing program 3: read$ptp(0xffffffffffffffff, &(0x7f0000000580)=""/244, 0xf4) [ 393.576250][T17764] loop1: detected capacity change from 0 to 2048 04:59:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) accept4$phonet_pipe(r0, 0x0, 0x0, 0x0) 04:59:44 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) [ 393.620212][T17759] FAT-fs (loop4): IO charset cp865 not found 04:59:44 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRESHEX=r1, @ANYRES32=r1], 0x1, 0x53a, &(0x7f0000000800)="$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") (async, rerun: 64) r2 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async, rerun: 64) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000200)="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", 0x206) (async, rerun: 64) sendfile(r2, r3, 0x0, 0x7fffff67) (rerun: 64) 04:59:44 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000000440)={&(0x7f0000000080)=@id, 0x10, 0x0}, 0x0) 04:59:44 executing program 3: read$ptp(0xffffffffffffffff, &(0x7f0000000580)=""/244, 0xf4) 04:59:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip_vti0\x00', &(0x7f0000000100)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1}}}}) [ 393.655572][ T27] audit: type=1400 audit(1699678784.425:401): avc: denied { accept } for pid=17781 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 04:59:44 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:44 executing program 5: syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(0xffffffffffffffff, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:44 executing program 3: r0 = syz_open_procfs(0x0, 0x0) read$ptp(r0, &(0x7f0000000580)=""/244, 0xf4) 04:59:44 executing program 0: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, 0x7c3f, 0x3}, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f00000000c0)={0x6, 0x7}, &(0x7f0000000140)={r0, r1+60000000}, 0x0) 04:59:44 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x1, 0xc8002) write$UHID_INPUT(r0, &(0x7f0000001100)={0x8, {"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", 0x1000}}, 0x1006) 04:59:44 executing program 3: r0 = syz_open_procfs(0x0, 0x0) read$ptp(r0, &(0x7f0000000580)=""/244, 0xf4) [ 393.734788][T17790] loop1: detected capacity change from 0 to 2048 04:59:44 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)="0e8826439a983a30849e10f6f95fe5e831ddd8835900ececfa0990f7835033197bb368450e", 0x25}, 0x0) 04:59:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 393.832554][T17790] loop1: detected capacity change from 0 to 2048 [ 393.896911][T17790] loop1: detected capacity change from 0 to 2048 [ 393.919241][T17790] loop1: detected capacity change from 0 to 2048 [ 393.966209][T17790] loop1: detected capacity change from 0 to 2048 [ 394.018073][ T3620] I/O error, dev loop1, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 394.027517][ T3620] Buffer I/O error on dev loop1, logical block 1, async page read [ 394.028265][T17790] loop1: detected capacity change from 0 to 2048 [ 394.035478][ T3620] I/O error, dev loop1, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 394.051060][ T3620] Buffer I/O error on dev loop1, logical block 1, async page read [ 394.070464][T17790] loop1: detected capacity change from 0 to 2048 [ 394.087259][T17790] loop1: detected capacity change from 0 to 2048 [ 394.103920][T17790] loop1: detected capacity change from 0 to 2048 [ 394.121803][T17790] loop1: detected capacity change from 0 to 2048 [ 394.187712][T17790] loop1: detected capacity change from 0 to 2048 [ 394.246580][T17790] loop1: detected capacity change from 0 to 2048 [ 394.297885][T17790] loop1: detected capacity change from 0 to 2048 [ 394.359393][T17790] loop1: detected capacity change from 0 to 2048 [ 394.407615][T17790] loop1: detected capacity change from 0 to 2048 [ 394.467729][T17790] loop1: detected capacity change from 0 to 2048 04:59:45 executing program 0: add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 04:59:45 executing program 5: syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(0xffffffffffffffff, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:45 executing program 3: r0 = syz_open_procfs(0x0, 0x0) read$ptp(r0, &(0x7f0000000580)=""/244, 0xf4) 04:59:45 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000840)={'vxcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000000280)={0x1d, r2}, 0x10) 04:59:45 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$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") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan0\x00'}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffff67) 04:59:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$can_bcm(r0, 0x0, 0x0) 04:59:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0xecd974071f50f78e, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}) 04:59:45 executing program 3: syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') read$ptp(0xffffffffffffffff, &(0x7f0000000580)=""/244, 0xf4) 04:59:45 executing program 5: syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(0xffffffffffffffff, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = io_uring_setup(0x37db, &(0x7f0000000240)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x18, 0x20000000, r7) 04:59:45 executing program 3: syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') read$ptp(0xffffffffffffffff, &(0x7f0000000580)=""/244, 0xf4) 04:59:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x7, @private1}], 0x1c) [ 394.610563][T17828] loop1: detected capacity change from 0 to 2048 04:59:45 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:45 executing program 3: syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') read$ptp(0xffffffffffffffff, &(0x7f0000000580)=""/244, 0xf4) 04:59:45 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f0000000440)={&(0x7f0000000080), 0x10, 0x0, 0x600}, 0x0) 04:59:45 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') read$ptp(r0, 0x0, 0x0) 04:59:45 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0x81) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000a00)=[{{0x0, 0xffffffffffffff5e, &(0x7f00000012c0)=[{&(0x7f0000003140)=""/4085, 0xff5}, {0x0}, {&(0x7f0000000740)=""/154, 0x8f}, {&(0x7f0000000980)=""/77, 0x4d}, {&(0x7f0000000440)=""/67, 0x3d}, {&(0x7f0000000500)=""/5, 0x4}, {&(0x7f0000000d00)=""/94, 0x5e}, {&(0x7f0000000ac0)=""/216, 0xd8}, {&(0x7f0000001140)=""/83, 0x53}, {&(0x7f00000011c0)=""/249, 0xf9}], 0xa}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x281}}, {{&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000100)=""/73, 0x53}, {&(0x7f0000000180)=""/240, 0xe2}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/234, 0xfffffd0f}, {&(0x7f0000000d80)=""/213, 0xca}, {&(0x7f0000000900)=""/119, 0x6f}, {&(0x7f0000000800)=""/234, 0xdf}], 0xa, &(0x7f0000000640)=""/233, 0xe2}}], 0x4000000000002dc, 0x100, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) 04:59:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) 04:59:45 executing program 5: r0 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f00000006c0)=0x0, &(0x7f0000000640)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000740)=@IORING_OP_POLL_REMOVE={0x7, 0x49}) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24f7, &(0x7f0000001780), &(0x7f0000000040), &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3]) r4 = syz_io_uring_setup(0x24f7, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000740)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r7 = io_uring_setup(0x37db, &(0x7f0000000240)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x18, 0x20000000, r8) 04:59:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x4000, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], 0x1, 0x53a, &(0x7f0000000800)="$eJzs1bFqU1EYB/CvabRpp87icMTFqVQ3JyOSQvGCoGTQyUDjkitC7nKTqY/g5OTL+BYOPoRk6hYJN9W2OFRscrT9/ZZ8nH9O8n2Hw71v774fHX2o3n39+Dk63Y1odWO7dbIRu9GKU8cBAFwnJ/N5fJ83cvcCAKyH9z8A3DyvXr95/rQoei9T6kTMjut+3W8+m/zgsOjtp4XtM7tmdd3f/Jk/TI3z+a3YWeaPfpvfjgf3m3yRPXtRXMi34mjl0wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwM22l1I7IlJKaffX6qyu+5tNvpdOXcib6uCw6O0vv3A+b8ed9trGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK5ANZmOBmU5HP/3xb352ZWIb7HmNjrLI13z7N3l3/71D37ayXAlthYHduldT1bRxuOIyH57L1F8+YODuoIi1xMJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIrZpMR4OyHI6r3J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+KajIdDcpyOF5hkXtGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAII8fAQAA//9Ryin/") (async, rerun: 32) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan0\x00'}) (rerun: 32) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1251c2, 0x0) (async) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) (async) sendfile(r1, r2, 0x0, 0x7fffff67) 04:59:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') read$ptp(r0, 0x0, 0x0) [ 395.046428][T17828] syz-executor.1: attempt to access beyond end of device [ 395.046428][T17828] loop1: rw=2049, sector=2048, nr_sectors = 4 limit=2048 04:59:45 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000040)) [ 395.149493][T17865] loop1: detected capacity change from 0 to 2048 [ 395.228240][T17865] loop1: detected capacity change from 0 to 2048 [ 395.266654][T17865] loop1: detected capacity change from 0 to 2048 [ 395.329458][T17865] loop1: detected capacity change from 0 to 2048 [ 395.376203][T17865] loop1: detected capacity change from 0 to 2048 [ 395.425354][T17865] loop1: detected capacity change from 0 to 2048 04:59:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0x8, &(0x7f0000000200)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}, {@fat=@umask={'umask', 0x3d, 0x8000000000000000}}, {@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@rodir}, {@rodir}, {@fat=@errors_remount}, {@shortname_winnt}, {@nonumtail}, {@fat=@codepage={'codepage', 0x3d, '1255'}}, {@uni_xlateno}, {@uni_xlate},