dv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 94.846890][ T1827] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 94.853890][ T1827] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 94.879968][ T1827] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 94.894625][ T1825] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 94.901614][ T1825] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 94.927576][ T1825] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 94.986303][ T1829] device hsr_slave_0 entered promiscuous mode [ 94.992694][ T1829] device hsr_slave_1 entered promiscuous mode [ 94.999065][ T1829] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 95.006596][ T1829] Cannot create hsr debugfs directory [ 95.013675][ T1827] device hsr_slave_0 entered promiscuous mode [ 95.020210][ T1827] device hsr_slave_1 entered promiscuous mode [ 95.026501][ T1827] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 95.034090][ T1827] Cannot create hsr debugfs directory [ 95.046132][ T1825] device hsr_slave_0 entered promiscuous mode [ 95.052548][ T1825] device hsr_slave_1 entered promiscuous mode [ 95.059183][ T1825] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 95.066711][ T1825] Cannot create hsr debugfs directory [ 95.115552][ T1828] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 95.133380][ T1828] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 95.142471][ T1828] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 95.157398][ T1828] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 95.183408][ T1826] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 95.199522][ T1826] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 95.208180][ T1826] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 95.218935][ T1826] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 95.244905][ T1830] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 95.260445][ T1830] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 95.269374][ T1830] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 95.278972][ T1827] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 95.288630][ T1830] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 95.296744][ T1827] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 95.308244][ T1828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.323375][ T1827] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 95.331710][ T1827] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 95.352447][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.360042][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.369132][ T1828] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.390802][ T1829] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 95.398903][ T24] audit: type=1400 audit(1641109427.372:88): avc: denied { remove_name } for pid=1420 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 95.421440][ T24] audit: type=1400 audit(1641109427.372:89): avc: denied { rename } for pid=1420 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 95.423906][ T1826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.468171][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.476681][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.485239][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.492310][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.499951][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.508497][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.516639][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.523657][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.531546][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.540247][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.548807][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.557059][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.565530][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.573734][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.582151][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.590361][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.598509][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.606579][ T1829] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 95.616920][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.624871][ T1825] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 95.637765][ T1825] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 95.646252][ T1825] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 95.654379][ T1829] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 95.666500][ T1826] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.685088][ T1830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.692203][ T1825] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 95.700587][ T1829] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 95.708822][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.716681][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 95.724475][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.731930][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.739655][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 95.746992][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 95.754445][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.762894][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.771330][ T75] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.778412][ T75] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.786117][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.794580][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.802871][ T75] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.809929][ T75] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.817579][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.826263][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.836602][ T1828] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.850836][ T1830] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.859031][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.866978][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.874797][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.891224][ T1827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.902055][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.910898][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.919488][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.927986][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.936500][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.944901][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.952986][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.961385][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.969812][ T75] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.976850][ T75] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.984756][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 95.992604][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.010162][ T1827] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.017694][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.025164][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.032737][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.041057][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.049295][ T75] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.056430][ T75] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.064122][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.072318][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.102748][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 96.111446][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 96.120161][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.128554][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.136973][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.145309][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.153716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.161914][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.170069][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.178568][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.186761][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.193823][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.201552][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.209944][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.218122][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.225134][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.239058][ T1830] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 96.249823][ T1830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.258259][ T1826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.276564][ T1827] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 96.287046][ T1827] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 96.305997][ T1825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.315016][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.323512][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.331367][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.340315][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.349041][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 96.357533][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 96.367299][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.375622][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.384427][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.392873][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.401552][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.409799][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.418315][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.426534][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.445344][ T1826] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.460724][ T1825] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.468988][ T1830] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.484981][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.492808][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.500544][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.507909][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.515276][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.523185][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.530602][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.539156][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.547535][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.555035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.562378][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.569957][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.580242][ T1827] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.592673][ T1829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.616516][ T1825] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 96.627027][ T1825] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 96.644544][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.653082][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.661832][ T1923] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.669104][ T1923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.676857][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.685576][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.693833][ T1923] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.700909][ T1923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.708763][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.717238][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.725831][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.734326][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.743073][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 96.751860][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 96.760549][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.769037][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.777590][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.786147][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.794771][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.803258][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.811800][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.819977][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.828108][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.835800][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.843655][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.857365][ T1828] device veth0_vlan entered promiscuous mode [ 96.865910][ T1829] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.879801][ T1825] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.891663][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 96.901168][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.910014][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.918853][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.926381][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.934027][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.944322][ T1828] device veth1_vlan entered promiscuous mode [ 96.961623][ T1829] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 96.972086][ T1829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 96.983831][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.991793][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.999585][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 97.007648][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.016038][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.024358][ T1917] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.031403][ T1917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.039118][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 97.047429][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.055812][ T1917] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.063097][ T1917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.070904][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 97.080070][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 97.088926][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 97.097443][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 97.105896][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 97.114339][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.122811][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.130908][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.139051][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.147328][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.162409][ T1828] device veth0_macvtap entered promiscuous mode [ 97.169203][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 97.177043][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.184799][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 97.192692][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 97.200272][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.208768][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.224341][ T1829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 97.243354][ T1828] device veth1_macvtap entered promiscuous mode [ 97.250897][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 97.258994][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.266632][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.275063][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.283769][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 97.291251][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 97.301115][ T1827] device veth0_vlan entered promiscuous mode [ 97.317375][ T1830] device veth0_vlan entered promiscuous mode [ 97.325917][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.334066][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.342896][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.351337][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.359997][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.368017][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.378021][ T1827] device veth1_vlan entered promiscuous mode [ 97.388711][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.396513][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.404127][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 97.411952][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 97.419970][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.427564][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.441586][ T1828] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 97.455057][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.471511][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.480249][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.488684][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.497162][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.505440][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.514802][ T1830] device veth1_vlan entered promiscuous mode [ 97.523002][ T1827] device veth0_macvtap entered promiscuous mode [ 97.531473][ T1828] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 97.545400][ T1826] device veth0_vlan entered promiscuous mode [ 97.564178][ T1830] device veth0_macvtap entered promiscuous mode [ 97.571867][ T1827] device veth1_macvtap entered promiscuous mode [ 97.579308][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 97.587159][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 97.596133][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 97.603890][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.612612][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.621069][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.629877][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.637909][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.646119][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.654637][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.664000][ T1828] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.672776][ T1828] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.681555][ T1828] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.690307][ T1828] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.705440][ T1825] device veth0_vlan entered promiscuous mode [ 97.714975][ T1826] device veth1_vlan entered promiscuous mode [ 97.723660][ T1830] device veth1_macvtap entered promiscuous mode [ 97.730554][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.738517][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.746161][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 97.754396][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 97.762436][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.770415][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.778570][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.788951][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.796713][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.811761][ T1825] device veth1_vlan entered promiscuous mode [ 97.826237][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.836729][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.849486][ T1827] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 97.862696][ T1825] device veth0_macvtap entered promiscuous mode [ 97.877310][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.885795][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.894324][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.902848][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.911219][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.919334][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.929684][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 97.937736][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.945412][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.954572][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.965084][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.976751][ T1827] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 97.985004][ T1825] device veth1_macvtap entered promiscuous mode [ 97.993931][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.004371][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.014163][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.024561][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.035201][ T1830] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 98.048696][ T1829] device veth0_vlan entered promiscuous mode [ 98.057320][ T24] audit: type=1400 audit(1641109430.022:90): avc: denied { mounton } for pid=1828 comm="syz-executor.4" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 98.064302][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 98.088189][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 98.096603][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 98.105324][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 98.113804][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 98.122678][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 98.131318][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 98.140920][ T1826] device veth0_macvtap entered promiscuous mode [ 98.149367][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 98.159792][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.169585][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 98.179989][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.190698][ T1830] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 98.210920][ T1829] device veth1_vlan entered promiscuous mode [ 98.212284][ T24] audit: type=1400 audit(1641109430.182:91): avc: denied { read write } for pid=1828 comm="syz-executor.4" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 98.218548][ T1827] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.249859][ T1827] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.258627][ T1827] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.260886][ T24] audit: type=1400 audit(1641109430.232:92): avc: denied { open } for pid=1828 comm="syz-executor.4" path="/dev/loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 98.267308][ T1827] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 07:43:50 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth1_to_batadv\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={@mcast1, @loopback, @mcast2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, r2}) [ 98.291430][ T24] audit: type=1400 audit(1641109430.232:93): avc: denied { ioctl } for pid=1828 comm="syz-executor.4" path="/dev/loop4" dev="devtmpfs" ino=104 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 98.339925][ T1826] device veth1_macvtap entered promiscuous mode [ 98.349789][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 98.351374][ T24] audit: type=1400 audit(1641109430.322:94): avc: denied { create } for pid=1976 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.358252][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 98.380576][ T24] audit: type=1400 audit(1641109430.352:95): avc: denied { create } for pid=1976 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 98.385327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 98.404064][ T24] audit: type=1400 audit(1641109430.352:96): avc: denied { ioctl } for pid=1976 comm="syz-executor.4" path="socket:[16233]" dev="sockfs" ino=16233 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 98.413678][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 98.436282][ T24] audit: type=1400 audit(1641109430.352:97): avc: denied { ioctl } for pid=1976 comm="syz-executor.4" path="socket:[16232]" dev="sockfs" ino=16232 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.470123][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 98.480103][ T1830] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.488881][ T1830] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.497721][ T1830] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.506472][ T1830] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.529007][ T1825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.539459][ T1825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.549256][ T1825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.559677][ T1825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.569480][ T1825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.579927][ T1825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.590968][ T1825] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 98.601870][ T1825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 98.612145][ T24] audit: type=1400 audit(1641109430.572:98): avc: denied { create } for pid=1979 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 98.612503][ T1825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.632255][ T24] audit: type=1400 audit(1641109430.572:99): avc: denied { ioctl } for pid=1979 comm="syz-executor.3" path="socket:[16763]" dev="sockfs" ino=16763 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 98.642090][ T1825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 98.677286][ T1825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.687102][ T1825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 98.697520][ T1825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.709522][ T1825] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 98.719399][ T1825] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.728110][ T1825] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.736818][ T1825] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.745517][ T1825] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 07:43:50 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140), r0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x4}]}, 0x24}}, 0x4000800) 07:43:50 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001380)={'xfrm0\x00', &(0x7f0000002740)=@ethtool_rxnfc={0x32, 0x0, 0x0, {0x0, @esp_ip4_spec={@multicast2, @dev}, {}, @hdata="a4a88b899b8ae67a52c851d399fb0360daf56b726a61db80e685080c8689127aef3113e73f8943f28e4b5f90df806a695b1a30f3", {0x0, @broadcast}}}}) [ 98.765102][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 98.779048][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 98.787565][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 98.800297][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 07:43:50 executing program 3: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xcce}}, [0x200, 0x0, 0x40, 0x80000000, 0xd0, 0x80000001, 0x8722, 0x2, 0x0, 0x7, 0x269f, 0x100, 0x3, 0x800000000000000, 0x81]}, &(0x7f0000000200)=0x100) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000002580)={'batadv0\x00', 0x0}) r3 = accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000080)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x84, 0x0}, 0x77, r2}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a0, &(0x7f00000025c0)={@mcast1, 0x0, r2}) [ 98.809059][ T1923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 98.821985][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.832448][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.842266][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.852675][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:43:50 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000000140), 0x18) [ 98.862470][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.873142][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.883022][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.893472][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.904729][ T1826] batman_adv: batadv0: Interface activated: batadv_slave_0 07:43:50 executing program 3: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xcce}}, [0x200, 0x0, 0x40, 0x80000000, 0xd0, 0x80000001, 0x8722, 0x2, 0x0, 0x7, 0x269f, 0x100, 0x3, 0x800000000000000, 0x81]}, &(0x7f0000000200)=0x100) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000002580)={'batadv0\x00', 0x0}) r3 = accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000080)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x84, 0x0}, 0x77, r2}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a0, &(0x7f00000025c0)={@mcast1, 0x0, r2}) [ 98.934149][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 98.951692][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 98.960424][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 98.968924][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 98.982753][ T1829] device veth0_macvtap entered promiscuous mode [ 98.994414][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.004980][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.014816][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.025232][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.035144][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.045546][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.055358][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.065775][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.076766][ T1826] batman_adv: batadv0: Interface activated: batadv_slave_1 07:43:51 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001c40), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_PAGE={0x5}]}, 0x24}}, 0x0) [ 99.089475][ T1829] device veth1_macvtap entered promiscuous mode [ 99.098377][ T1890] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 99.108801][ T1890] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 99.116741][ T1890] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.125491][ T1890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 99.137344][ T1826] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.146078][ T1826] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.154779][ T1826] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.163525][ T1826] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.179586][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.190045][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.199860][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.210459][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.220337][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.230746][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.240565][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.250970][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.260765][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.271164][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:43:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5421, &(0x7f00000018c0)={'gre0\x00', 0x0}) [ 99.284097][ T1829] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 99.307666][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.322647][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.338457][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.348935][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.358738][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.369200][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.378992][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.389397][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.399193][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.409598][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.419393][ T1829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.429886][ T1829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.440925][ T1829] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 99.454961][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.463979][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 99.488751][ T1829] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.497458][ T1829] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.506164][ T1829] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.514853][ T1829] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 07:43:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[], 0x33fe0}}, 0x0) 07:43:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a2, &(0x7f0000000300)={'ip6tnl0\x00', 0x0}) 07:43:51 executing program 3: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xcce}}, [0x200, 0x0, 0x40, 0x80000000, 0xd0, 0x80000001, 0x8722, 0x2, 0x0, 0x7, 0x269f, 0x100, 0x3, 0x800000000000000, 0x81]}, &(0x7f0000000200)=0x100) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000002580)={'batadv0\x00', 0x0}) r3 = accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000080)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x84, 0x0}, 0x77, r2}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a0, &(0x7f00000025c0)={@mcast1, 0x0, r2}) 07:43:51 executing program 4: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xcce}}, [0x200, 0x0, 0x40, 0x80000000, 0xd0, 0x80000001, 0x8722, 0xfffffffffffffffe, 0x0, 0x7, 0x269f, 0x100, 0x3, 0x800000000000000, 0x81]}, &(0x7f0000000200)=0x100) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000002c0)={0x0, 0x0, "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", "7607b53000c89b45d7432eebacd4fb8c7036460050c7d16e8a7226ccaf3c9c27fe76dd8c2278280d2c1fc579a26327a472a2f34bc1e8cedcef6e2a4a5b4653ff97dd0abaaed38bcc77ff8f34b400d360837a70a08c975144f4b3063e36e1df34ac7b8dae19f5cef49cbc7cf5f5ff5e339a72def4bec370756371f980413a414ef10e95399c4dc430ea8a381d900c3221450365af8a735b05bd08e017df35db17c689317caa38e159fc67c821bdf63d9a4af8bc8274fa2b935fb03de389b7deb7313c88df98851b91d15560dbaa412d7b2c6841cb6f4572a9fc6a75a14a8a0d3e357827e20f0daa6db01fefcf28f00ac1a97794230c45ec7c7b9a236c9ba2fe6d5d96da427976d345aa7228225ab74d38e178f93a762ce9ff86aaff262046b10c2b8d6c1b92ecbdfdeb621d81bb237a2a53eb0b2a96819fa864fa8c4edcad13e79ada56942d1c6fca077605e06b82d4f8b7517597fbcd5983cce525eb5ecf32eb129e6c7d2049084660092e2f77a36c79a33791145a85a05ed498ae1c2a494f4f7a29f410500de27b1c42c504b29f7e20d72fe27814c4e041a8a461d24990e420ccefb87f3c8221f8415fe74d233f44b93276ca86f2094ce02c9f323eb063ee54a3d0739a1a54738436d825afe78e979b1af73e62ba3152f95f63a2e4a8d34c7b8fe3a3c6e6f683869d82c6125e7f64fec77f57823d84cf8fb9c09d10ff2ba019334d5c1e177415911547ba62ef9c500f2aad99616a1205f88cfca95b45abcca6629e4e31c81ff2a101431be809653b77b3e4de6de1cfd53b6f8adc1d279037fe373c1d95edccca7d5f94a28df2dcfe5049e272b81542bffb0c23b025b8d4ee4a006d82765f961231c7fbd0d2c0595ba221589fbd45f2b792b887d5dd6c13ca6bf080c4b48d8393cd7d9912518051eec2f16d74b5f91ee9d2ea478c214b069f16fee1ea904b9f90574037d816d31cf1689b3d8f45178ec615ac489e1e2e0373f035bf24e37cc0fde99da895283e0f9788c782c5325d8ac9d6f6305967ea29dc89aaaf31dbaf7f623c83978033f1daf5917ef4922d3a42fc408e7e9aa5483a962a87f8fb01ba1edecbf682e25a063cc6eb11efd0d11942077542522a441ace54814cb28c31e785a3d64decd7539c7327f90fa46abe773ac8ef0c76e5667216a470efdac7ee7a8c3c865b5f59040e3251e075cc602adada49451882003d30f04a5be62325eb2ee888696e34460add050cd0c3faa8f8a2499699dbc721f118716586308e7331aa03f0a3f5d6089101e63e1d56fbab5b352c2cf7c70ae8eefe9338889c4802a2d268e8f049ef27f8a31fff57687379e55ea5235c3c662236e50508030708bbb08e1fd4271fda7715c19b7d1728c6d37f691c1ed2814bc5c0718d5e11b2bb92153f3f06e619bb340b07684ab3b88c27469f90c00ae0e56acac3d6fbc2803774ceb05b3a3ea075cbbde58cf3c8a1517fed0b07ff0a6b29c093bef5916abb8589eb258cc63d4d670112d2b2696e798b144763397f033af0d18026e8eeb7dcb26b51b5fac16671d28844e5d6146bef465c0472491cf647f8705930af4b852ed1eb779ef06c5e8dd2e5efda800074097f848ffe33e01465178f8cb6a9ab6f6f122b701894ea97dcf7af2b5654e8196b0efb55007f3f602dd1f4302138e5765a74919928ffaa8b8b6a97dacbfde3826b0f0017e59164f514f915dfcc926affc4eae9d97b71d6ea570d38e28f41a82a5ca6c500a246b28daef4b8e3298b066d98ec7a6102fce99b6c949c46115f4f507f27718b332811f02ea5dc7f12a67e4895a21d72e52fe80042b9fc3de7b53e96ff107c8b5d7771e6863e94fac0597c2888c535fbad08f09cb20151ffa2557d58ed80b7e775ee63bd6da7cfeb3caf3b131daa66c4c6c575029bbb23c35b1c7a6dac6ee0a593b23b4fe40c78d07e7c019b64eb4817235015137829537796f79a5d75fea204b9a566aeb1b81700be2e014d2696b16b15a20a2e013c6b2cffdea2ba13d9d0a3aae083f60dc25d2241fac4d8f432fd76e13d069ac086d6026273185a42ba9e6c737245c20d8ca8c7cb1558caa590fb2e006dfad2295a04f2e5d8622dfa6ce28c22120ab2b179ff5054f5c8d9b8cfd8700493e9a763b785b9ca67a95d694348b08d2ef3b1a654829ad94ae8ec9882c943f41b195ae0569e809f11fee7bb0f877b17098c256664efe243efb9469ebac00bab319e90c1fe5355963d70a5ef5c459f18ccda72e878c1c38d016730148095f7267cd57c79a2b3d6548663f39f44f1065586d056e80585e79956defba5203d9001cef0dbc5b0c95d5c7145a2ede3d8531e225b803c39bd116d276156e2ffe9c89180e3b415b2caeab2279c7bd93bde14a494a5441ed2bc9214ee957e6d7e2b869d6c47f5c9950643f95566b41f503670c0fd344d9330e007b1aef8462c2d323c5ddfd1d295f37c8248cc8962492a20f962e1825feab9e7bb9c9047d14026ddfa210da9e6a961a455a43c0f33e7b425d9ef43f3167957e8a7f1afdd03d1fadc70af38ba7f1b3d2e4d97bdcc53fc989aaed558102e54f5356a120910c3d1a5e903eceef4e3329e477f23ec1915ec64ba63515dbe4d847ae27ce19caa08926abd489b0167460684bed223dd51e757850cc91f386c03225622c57dd3cef896bcb7d7353d871210e4426c9dd8ecdd0b21ac9a0772b577195aab8ab6d99acd6823df865c0ebe0d818e386067eb804fd69ae65fb6f43e505be59e0699ee3aba263f00a4da1a9740ff429517ae8f5b42ed4d23be38d9bc2b01416684bffbf1ca9f676859c0d510ac77e6a876fe4c0b6d45cf32ebe2c38d828aacf33ab04a1ab0f8fb96369b6d0f839c56e6e6993f4b5bab11c988dba504b6a80784e65069150366e52a0616f6ddb39d505a4a1a0a0a20be706750e2f4fac80bc305fa63f08872e3f7c79a1ccf2b3a8959e81b4375370b2fb4320b15f6a0a65d32ef9b75ebc5d2e5c4d4bef63b0522050a34ace48afa134cda1a4b778fb30d9b891f981d0bc9e96920c900e539934c59c0d6c1d67bba8a081d38cfe0c162ee7700c6855c561e8a97cb2d57cca60277756daf41c7277e892aaec2f7523681a6864352c561ce1b94cf6c910cdb8b70b7f30ebcf38dfde2daff1746552bab717f45852a2f6e8c8a00622ade258c29b481dccb9ec3f6059edfae78bb867c1b554de634f8159e60a2ee6c2e97c36cc577a3355597a5614dc5f3ecd70f3bcb40b12e5559e8fad42fbeb9d9d69766f4229acd4cae4b7d3bb71d35549d55ea034b4370e47d570cf91350364ef0adc42fb3c78fbb87454ec6ec53d29c04f02a7b9e2f15f4701484ac8b4677310cae5319bfdd4a07028794d8851fac870a9dc401ea517e79edb2265cc28dcc0e294ac983310ece4bcad7b756e95ec68203cf9e59f667e7428f2ae9cbe73e8b30f12124bed4a5958cbf7fe971766b0bef522e7eb58bf387f157e990de723010f3e7f65df9b97d882b441675a2b2b5721adb36b045488f930d15d339c65bf57897b6ee7b92b3bd816488f2c7075a6a95220fc5e69742a0cedc8755559c90d206028dfe17953a29d7dc1f945f001eaf7988538e4eb7aa16d288d35c31949c07ec33ed7bea556281b171eb7197893071ab07fd94d040b04e9c0eb3330b792d81bd9dbcf716c014f7ba578df456580481950680dc8f87bd35523caec2f698e09d4ccd333a8c978b21cc6bda56adc3f8e6f288fa958af81d7586528ce8d8fdee888592b110b4badf9defcfd437cd3066e34b3c76792dbe7df91a9151c43aa8de5c42bd4a9eeb6e8431f0402aaa6d5e02f26e3f62fd371a5e7a03c77c5af5d5364951cfc31125b9baadf8922604ce1ad8867ceb0d336dedacc718124bdd33816c9c1f93e3db1bead894e853e4d7aab581e6fd96cf86ce3df5a135812a0d4e1e25e501604f66918d99b9163b8bc91d7c1b19fdb4c484504e16e1b01b2ee4f62e1cb37fe6195f6ada286209e144c7e92e767706037942a795c7e2c6369b1adf241331d4d6e62221f9f4322b68ad762910170c2f35584273311661deef4fa292b7fbf2eec49d444854ff606ba7d45423445ed48a23dc6e05cc49b9772554d52bdd82b1c0c81f6189ad93eac2359d09248f1b23dc22e79c14fffd50826c26e030e0819c313ce93aa9e0860db4a2d79f8b27fbb0f846ad741a8a9d99256054ae56f8a579247beeb516f6f8a982054f10337af4e3d05b6d87130f0b3927e5444c6090a8a495a635d7b69efc7a13e3e902331ddf321f236381351151bfd7777ecda391f40d16efb7f344a3e28a2ef401147fc58a30d4538fce1b1d8120ab6e251ca790ac2c0de5ab227e0acc9f0df531a487a8e48fce5a1ccaa5b269bb6f1fb47e8d4524ee0ebdf1f5d55a5348464f2863213a8ea954e39bccb9649ac20eb3be0213b9e21d0fbc3370d8ae5bed3dfd83afa3b167747b4153ebfbf36ad2e93e0405e8c04b4a07779fc7c3684dfa2a6296eb5f5c4e2db8bd5df0a139fb30f97668a8825211d9c0991afd5c29f7b8a70f607d38356217a2b21878c26616d84a6364cd386cc4477d2b81390ca5ab690400b702724edf97021f1079ae336c7efb0eee270e21037a76816c2241f2adfa08fc1d117dc673f4e00b2063963498160c64a723aa117921f06ac14fefb94242000122ec2ca584634d79ecef0ea31de551aa4ff7e9b60edb009765b488d6cb79b2d172f3377f1729171b18180f2ad1e5b158d26425f4450322b13637b47d47510e53f75f340f2c2285de43c032cafb88ca715d7782471f900aa44a2d59531db1fe997cdc7f2ed3e0d2d34184beef8f0c086ce279ddc064e65a94a1bdc5245574b32e05ed335f37524e81ba465c8b4b1431c67c760f738e23039ee07fe9966b2798a6ec91b8995f400e18dc8d2f728ad5a7f6b2f234342850dc40f660cdc2c781801eb7881197404e6a5a9a8606555f228e58d6e2e0f5009f6021809926421e2eb3991712b72944e09d5d1e81213e422f672fdc4ef2ff63a430ca46c9431c424db8e304324aa6c172689edfdcd98d5268a255b079e4d21fa8de3c2f02e5064c9feba1bb8272de9ade366e1f78c4930ff35ff71ed283df23accf4cf3cfb70ba5e5c89a5a05820527652685336b49063d1ec98d219af0281c43113dd2886314552a7dcb85dc3c0c78f4e49972664adb73c81f23b6236c2c5ae1c57ef6bf8e8b8e9c013a106a22c14f3340775f46702fdfc59368ad9333574e461040768fa1afd391635a2a9eb09e1ce2069f6b9ae384597ada56a9ff4b9bb76efd4288b43b8b60c8d32ba556a49ba8a3912f2cf2543794b1c08423a0495de147c609215eef544f8a852544353f2e22b85cbe1122d3227217a51b419a65c8020479b75a7baa19f6e93fc8ac158454170657"}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000002580)={'batadv0\x00', 0x0}) r3 = accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000080)) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000003280)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003200)=[{{&(0x7f0000001b80)=@abs, 0x6e, &(0x7f0000001c40)=[{&(0x7f0000001c00)=""/64, 0x40}], 0x1, &(0x7f0000001c80)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000001d00)=@abs, 0x6e, &(0x7f00000030c0)=[{&(0x7f0000001d80)=""/9, 0x9}, {&(0x7f0000001dc0)=""/218, 0xda}, {&(0x7f0000001ec0)=""/198, 0xc6}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f00000012c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c00000000b01db13c9e0f0000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x98}}], 0x2, 0x40010061, &(0x7f00000032c0)={r4, r5+10000000}) pipe(&(0x7f00000013c0)={0xffffffffffffffff}) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000001400)={@dev={0xfe, 0x80, '\x00', 0x22}, 0x6d, r2}) setsockopt$bt_BT_DEFER_SETUP(r6, 0x112, 0x7, &(0x7f00000034c0)=0x1, 0x4) setsockopt$inet6_dccp_int(r0, 0x21, 0x1, &(0x7f0000001380)=0x1e2f0c17, 0x4) setsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280)={0x6, 0x7ff, 0x6, 0x7, 0x9c, 0x81, 0xfffb}, 0xc) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x77, r2}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a0, &(0x7f00000025c0)={@dev={0xfe, 0x80, '\x00', 0x3a}, 0x0, r2}) 07:43:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8953, &(0x7f0000000040)) 07:43:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000b80)={'ip6tnl0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private1}}) 07:43:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg(r0, &(0x7f0000009d00)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="ca", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001440)='{', 0x1}], 0x1}}], 0x2, 0x0) 07:43:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 07:43:51 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000a00)='/sys/block/loop0', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 07:43:51 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000300)) 07:43:51 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x9, 0x2012, r0, 0x0) 07:43:51 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000240)={0x18, 0x0, {0x10, @random="08c7ff001000", 'vlan1\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x100003, @local, 'bond0\x00'}}, 0x1e) 07:43:51 executing program 0: syz_open_dev$vcsu(0x0, 0x0, 0x0) r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) clone3(&(0x7f0000001280)={0x40000000, &(0x7f0000000040), 0x0, &(0x7f00000000c0), {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 07:43:51 executing program 1: clone3(&(0x7f0000001280)={0x40000000, 0x0, 0x0, &(0x7f00000000c0), {}, 0x0, 0x0, &(0x7f0000000200)=""/4096, &(0x7f0000001200)=[0xffffffffffffffff], 0x1}, 0x58) 07:43:51 executing program 2: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x2710}}, &(0x7f0000000040)) 07:43:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x50, 0x1, 0x2, 0x801, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @private0}}}]}]}, 0x50}}, 0x0) 07:43:51 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) 07:43:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000080), 0x4b) 07:43:51 executing program 2: open$dir(&(0x7f0000000180)='./file0\x00', 0x240, 0x0) setxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=@random={'security.', '\x00'}, 0x0, 0x23, 0x0) 07:43:51 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 07:43:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x21f, 0x4) 07:43:51 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4000001) 07:43:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) 07:43:51 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x2c040, 0x0) 07:43:51 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000001500)={0xffffffffffffffff}, 0x0) 07:43:51 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000040)) 07:43:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x59, &(0x7f0000000000)={&(0x7f0000000540)=@delchain={0x88, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8}, {0x5c, 0x2, [@TCA_BPF_ACT={0x58}]}}]}, 0x88}}, 0x0) 07:43:51 executing program 0: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) 07:43:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in6={0xa, 0x4e21, 0x0, @dev}, 0x80, 0x0}, 0xc115) 07:43:51 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000a80), 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) 07:43:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000000)=0x21e, 0x4) 07:43:51 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fcntl$lock(r0, 0x6, 0x0) 07:43:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@setlink={0x34, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x6}, [@IFLA_IFALIAS={0x14, 0x14, 'geneve0\x00'}]}, 0x34}}, 0x0) 07:43:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001080), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 07:43:51 executing program 5: tee(0xffffffffffffffff, 0xffffffffffffffff, 0x9, 0x0) 07:43:51 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 07:43:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_SUPPRESS_IFGROUP={0x8}]}, 0x24}}, 0x0) 07:43:51 executing program 0: sysinfo(&(0x7f0000000000)=""/14) 07:43:51 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 07:43:51 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='\x00'}, 0x10) 07:43:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@setlink={0x20, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x6, 0x40}}, 0x20}}, 0x0) [ 99.923709][ T2075] batman_adv: batadv0: Interface deactivated: batadv_slave_0 07:43:51 executing program 5: waitid(0x0, 0x0, &(0x7f0000001b40), 0x4, 0x0) 07:43:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000001ac0)={&(0x7f0000000000), 0xc, &(0x7f0000001a80)={0x0}}, 0x20040004) 07:43:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000100)=0x2a000000, 0x4) 07:43:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x15, &(0x7f00000002c0), 0x4) 07:43:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@setlink={0x3c, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan0\x00'}, @IFLA_GROUP={0x8}]}, 0x3c}}, 0x0) 07:43:52 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 07:43:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040)=0x4000000, 0x4) 07:43:52 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) 07:43:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, 0x0) 07:43:52 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x44, 0x0, &(0x7f00000001c0)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 07:43:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@cred, @rights, @cred, @cred, @cred, @cred, @cred, @rights], 0xe8}, 0x0) 07:43:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003240)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c, 0x0}}], 0x1, 0x0) [ 100.046494][ T2075] syz-executor.4 (2075) used greatest stack depth: 11304 bytes left [ 100.070636][ T2102] A link change request failed with some changes committed already. Interface batadv_slave_0 may have been left with an inconsistent configuration, please check. 07:43:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newqdisc={0x30, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4}}]}, 0x30}}, 0x0) 07:43:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f00000010c0)=[@rthdrdstopts={{0x18}}], 0x18}}], 0x2, 0x0) 07:43:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20041, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x40106614, 0x0) 07:43:52 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x40046207, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="04630440"], 0x0, 0x0, 0x0}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) dup2(r2, r0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000001480)={0x8, 0x0, &(0x7f0000001380)=[@increfs={0x40046305}], 0x47, 0x0, 0x0}) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0x44, 0x0, &(0x7f00000001c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 07:43:52 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x52380, 0x0, 0x202, 0x6, 0x800000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="95f15ad4349bf43a128e61b76377a456b2273c4ed346dedd4a3f76ae3dddaad3fdeb2fef3e4374ce2eee87688da27e91cbda0d8a8e54e65af29eda5aa1d414f52a34e037493af2974980ff99491523ff90725f00", 0x54}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x401}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) clone(0x11a20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ppoll(0x0, 0x0, 0x0, 0x0, 0x1aa8) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) 07:43:52 executing program 0: pselect6(0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, &(0x7f0000000100)={0x0, 0x3938700}, &(0x7f0000000180)={&(0x7f0000000140)={[0x7]}, 0x8}) 07:43:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(0x0, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) open(&(0x7f0000000100)='./file1\x00', 0x8600, 0x4) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x12a}, 0xc030, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0xfffffffc}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f00000001c0), &(0x7f0000000240)=0x10) sendfile(r0, r2, 0x0, 0x8400fffffffa) [ 100.164292][ T2120] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 100.188738][ T2128] loop5: detected capacity change from 0 to 264192 [ 100.190685][ C0] hrtimer: interrupt took 20485 ns 07:43:52 executing program 3: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_open_dev$vcsu(0x0, 0x0, 0x0) [ 100.212663][ T2134] loop1: detected capacity change from 0 to 264192 [ 100.216306][ T2136] loop4: detected capacity change from 0 to 4 [ 100.243009][ T2136] EXT4-fs (loop4): Number of reserved GDT blocks insanely large: 17161 07:43:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x24000981) 07:43:52 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x4041, 0x0) 07:43:52 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) 07:43:52 executing program 3: syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) 07:43:52 executing program 0: perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 100.255523][ C1] sd 0:0:1:0: tag#3804 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 100.265401][ C1] sd 0:0:1:0: tag#3804 CDB: opcode=0xe5 (vendor) [ 100.271754][ C1] sd 0:0:1:0: tag#3804 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 100.280817][ C1] sd 0:0:1:0: tag#3804 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 100.289904][ C1] sd 0:0:1:0: tag#3804 CDB[20]: ba 07:43:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:43:52 executing program 0: futimesat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={{0x0, 0xea60}, {0x0, 0xea60}}) 07:43:52 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000300)={'ip6tnl0\x00', 0x0}) 07:43:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:52 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:52 executing program 1: r0 = socket(0x11, 0xa, 0x0) sendmsg$kcm(r0, &(0x7f0000007300)={&(0x7f0000004a00)=@ethernet, 0x80, &(0x7f0000006e80)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000006f40)=[{0x28, 0x0, 0x0, "3eb87c7ca06f350bbf5856479e5a02149e"}], 0x28}, 0x0) 07:43:52 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:52 executing program 3: inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000009140), 0xffffffffffffffff) 07:43:52 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001400), r0) 07:43:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, 0x0, 0x0) [ 100.653146][ T2164] loop4: detected capacity change from 0 to 4 [ 100.659639][ T2166] loop0: detected capacity change from 0 to 264192 [ 100.661832][ T2167] loop2: detected capacity change from 0 to 264192 [ 100.685856][ T2164] EXT4-fs (loop4): Number of reserved GDT blocks insanely large: 17161 07:43:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, &(0x7f00000001c0)) [ 100.724921][ T2172] loop5: detected capacity change from 0 to 264192 [ 100.751257][ C0] sd 0:0:1:0: tag#3806 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 100.761118][ C0] sd 0:0:1:0: tag#3806 CDB: opcode=0xe5 (vendor) 07:43:52 executing program 1: getgroups(0x2, &(0x7f0000000000)=[0xffffffffffffffff, 0x0]) 07:43:52 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x10}, 0x10}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940), 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000009140), 0xffffffffffffffff) [ 100.767451][ C0] sd 0:0:1:0: tag#3806 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 100.776491][ C0] sd 0:0:1:0: tag#3806 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 100.785611][ C0] sd 0:0:1:0: tag#3806 CDB[20]: ba [ 100.810544][ C1] sd 0:0:1:0: tag#3807 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 100.816419][ T2179] loop4: detected capacity change from 0 to 4 [ 100.820416][ C1] sd 0:0:1:0: tag#3807 CDB: opcode=0xe5 (vendor) [ 100.832867][ C1] sd 0:0:1:0: tag#3807 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 100.841924][ C1] sd 0:0:1:0: tag#3807 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 100.851146][ C1] sd 0:0:1:0: tag#3807 CDB[20]: ba [ 100.910118][ C0] sd 0:0:1:0: tag#3808 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 100.920023][ C0] sd 0:0:1:0: tag#3808 CDB: opcode=0xe5 (vendor) [ 100.926365][ C0] sd 0:0:1:0: tag#3808 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 100.935415][ C0] sd 0:0:1:0: tag#3808 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 100.944466][ C0] sd 0:0:1:0: tag#3808 CDB[20]: ba [ 100.958161][ T2179] EXT4-fs (loop4): Number of reserved GDT blocks insanely large: 17161 [ 101.234278][ T2166] syz-executor.0 (2166) used greatest stack depth: 11240 bytes left 07:43:53 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:53 executing program 3: openat$pfkey(0xffffffffffffff9c, 0x0, 0x404200, 0x0) 07:43:53 executing program 1: clock_gettime(0x4, &(0x7f0000000000)) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(0xffffffffffffffff, 0x0, 0x0) 07:43:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:53 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:53 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x192240, 0x0) 07:43:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000180)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000340)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE, @NL80211_ATTR_COOKIE, @NL80211_ATTR_COOKIE, @NL80211_ATTR_COOKIE, @NL80211_ATTR_COOKIE]}, 0x2c}}, 0x0) 07:43:53 executing program 1: r0 = io_uring_setup(0x782d, &(0x7f0000000140)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x5, 0x0, 0x0) [ 101.584925][ T2192] loop4: detected capacity change from 0 to 4 [ 101.593240][ T2198] loop0: detected capacity change from 0 to 264192 [ 101.608969][ T2192] EXT4-fs (loop4): Number of reserved GDT blocks insanely large: 17161 [ 101.611847][ T2196] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 07:43:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffff42) 07:43:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$qrtr(r0, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000180)="e6", 0x1}], 0x1}, 0x38) [ 101.650049][ C0] sd 0:0:1:0: tag#3809 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 101.655720][ T2202] loop2: detected capacity change from 0 to 264192 [ 101.659916][ C0] sd 0:0:1:0: tag#3809 CDB: opcode=0xe5 (vendor) [ 101.659934][ C0] sd 0:0:1:0: tag#3809 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 101.659953][ C0] sd 0:0:1:0: tag#3809 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 101.690890][ C0] sd 0:0:1:0: tag#3809 CDB[20]: ba 07:43:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newtclass={0xbc, 0x28, 0x1, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, {0xd}}, [@tclass_kind_options=@c_dsmark={{0xb}, {0xc, 0x2, @TCA_DSMARK_MASK={0x5, 0x4, 0x1}}}, @tclass_kind_options=@c_atm={{0x8}, {0x40, 0x2, [@TCA_ATM_EXCESS={0x8, 0x4, {0x7, 0xffe0}}, @TCA_ATM_FD, @TCA_ATM_EXCESS={0x8}, @TCA_ATM_FD={0x8}, @TCA_ATM_FD={0x8}, @TCA_ATM_HDR={0xa, 0x3, "abde6cbec5e1"}, @TCA_ATM_FD={0x8, 0x1, r0}]}}, @tclass_kind_options=@c_fq_codel={0x5}, @TCA_RATE={0x6}, @tclass_kind_options=@c_netem={0xa}, @TCA_RATE={0x6}, @tclass_kind_options=@c_netem={0xa}]}, 0xbc}}, 0x0) [ 101.758137][ C1] sd 0:0:1:0: tag#3810 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 101.768024][ C1] sd 0:0:1:0: tag#3810 CDB: opcode=0xe5 (vendor) [ 101.774360][ C1] sd 0:0:1:0: tag#3810 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 101.783425][ C1] sd 0:0:1:0: tag#3810 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 101.792483][ C1] sd 0:0:1:0: tag#3810 CDB[20]: ba [ 101.814287][ T2209] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.3'. [ 101.832157][ T2211] loop5: detected capacity change from 0 to 264192 [ 101.857062][ C1] sd 0:0:1:0: tag#3811 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 101.866953][ C1] sd 0:0:1:0: tag#3811 CDB: opcode=0xe5 (vendor) [ 101.873313][ C1] sd 0:0:1:0: tag#3811 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 101.882349][ C1] sd 0:0:1:0: tag#3811 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 101.891428][ C1] sd 0:0:1:0: tag#3811 CDB[20]: ba 07:43:54 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:54 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDDISABIO(r0, 0x4b37) 07:43:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000080), &(0x7f0000000100)=0x8) 07:43:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x10) 07:43:54 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:54 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0xb, 0x0) 07:43:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@sndrcv={0x2c}], 0x2c}, 0x181) 07:43:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x185}, 0x98) [ 102.525693][ T2219] loop4: detected capacity change from 0 to 4 [ 102.525739][ T2217] loop5: detected capacity change from 0 to 264192 07:43:54 executing program 1: sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0xfffffffffffffcc1) 07:43:54 executing program 0: bpf$MAP_CREATE(0x9, &(0x7f00000021c0), 0x48) [ 102.594183][ C0] sd 0:0:1:0: tag#3812 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 102.604051][ C0] sd 0:0:1:0: tag#3812 CDB: opcode=0xe5 (vendor) [ 102.610427][ C0] sd 0:0:1:0: tag#3812 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 102.619463][ C0] sd 0:0:1:0: tag#3812 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 102.628513][ C0] sd 0:0:1:0: tag#3812 CDB[20]: ba [ 102.635447][ T2231] loop4: detected capacity change from 0 to 4 [ 102.759822][ T2235] loop2: detected capacity change from 0 to 264192 [ 102.793869][ C1] sd 0:0:1:0: tag#3813 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 102.803749][ C1] sd 0:0:1:0: tag#3813 CDB: opcode=0xe5 (vendor) [ 102.810119][ C1] sd 0:0:1:0: tag#3813 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 102.819154][ C1] sd 0:0:1:0: tag#3813 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 102.823579][ T2217] syz-executor.5 (2217) used greatest stack depth: 11160 bytes left [ 102.828202][ C1] sd 0:0:1:0: tag#3813 CDB[20]: ba 07:43:54 executing program 1: socketpair(0x26, 0x5, 0x0, &(0x7f0000000040)) 07:43:54 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x20000080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:43:54 executing program 3: socketpair(0x15, 0x5, 0x133, &(0x7f0000000040)) 07:43:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:54 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000001100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001180)) 07:43:54 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x303783, 0x0) close(r0) 07:43:54 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$getflags(r0, 0x1) 07:43:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=""/190, 0xbe}, 0x0) sendto(r1, &(0x7f0000001680)="ee", 0x1, 0x0, 0x0, 0x0) 07:43:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0) 07:43:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:55 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getown(r0, 0x5) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 102.949056][ T2239] loop4: detected capacity change from 0 to 4 [ 102.981625][ T2246] loop5: detected capacity change from 0 to 264192 07:43:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002680)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="3f7f594ff578025325cd57bca27e044770ba06c5f010abf75c456f5525b0040a1f964dae0a32ea7f0a4fb2419376741860ef72469902ad76284a08c04451a10221e2dc3abcb88205df9c2e79031eecf408ee206865fba7e63619af7aae89e4f92ea68771494924274f82b15f585cbd5f7b799e991b", 0x75}, {&(0x7f0000001140)="9089c3f228db8b11a7c7a767755138861e4553eb11542f7012ce302f54076812a1a662b4f193150a10ba464a5d63a858c5734961039159df6962e11c23add1e31ba5090c875c49b795b4b6207496d969e7b5b6dac8ed353bf30549e10447a7c2536274b0fde4f4311cfa210af8d567e090ae4fe328f80ba06d29adcc9897bac29ebde5b868ac5eb97342fb4e9671c3148d384656f2528c0b0cfedbb0f34922c8a3b0cc39f245d82f60626426bfd046c65b70861f18a9c9", 0xb7}, {&(0x7f0000001200)="707cc5d19d854c183127b231f71ce85a1347f3a19a2e0011f1e542883924cf63fb9742da737fa18a6cbd3af3b6e1131b1214384a17b45598062b9d0a1ceaab2d3766ffdd674924f75112836134d901afc32e31afe61ad70cce34bca838a94929853de2dc158fd07b01004dfc8cd9745d908775d4181c2e05c671b2289078484892b2435407d4a8d28a79b1ae22dd917e6b6995b9b1e7940394788e760189798991f3c87d1d905c59495764de698b7b991407632a7b09b9ad88479e7c4f62d893834d9cffeadde7ceaa0a7ead8eaefe448f732bed567ca747712ef4a6793fc79c8056ee58", 0xe4}, {&(0x7f00000013c0)="3e70ce7d8046940d4e4a6a3f1189dd7f65fe4cbe89e59c0819a7cc4bfd2a4930d25eef63b82c2a3f53c6499085bdd24471fef7ccca71d2ba1c68982eab516555343bb319f4fe78a428b2f00f452e984cf8470e3b3f3a279b1ae10224e34273fac5ed2cdba2143b81f9db4198ea5d7298d739e589f87a95c973f55d30de260e65e0cd13855eab5a8b266341f664e1f42cfef5051f39f095c794c5f5821cbb4f35de8075fa9722bf1fcfb9dbfb677b56565a31", 0xb2}, {&(0x7f0000001480)="2f188634a970427057f6bd531a87a85121f1074400033cd5b0455bab944f7c59abc8680fcc3c1db01b627adbb487601d1fdde1b04558b051302fad9bd78cf810e060b321fdd17221b053f98a3d5e0ef47dbdf5ecc8c1c78f691838bbb3bb3a9a562f4eb2e7d4dc40f316fc30b2bb029629239fa1b2ddbaf780b587e86e589a54ed205ee04a485c90292967a32b83e515b66aff09f1bfde9d9b8a2d05a6000a777fd9a63a320ed14919323954146f9b89ff40a0d36aa99de480e505d6a59c4820f276a113366fa98acafeeb16801563efdcbbe9ffcb0c262056c50f9bbf827abd86bda61c69e4827f98bb2ff9d61b04b1d9a8fe4099d110e73c091d801782ceec5636b9b963b1a04ea86cb54409490f4c1a5d49361bc4484e3f8bb2668cc4d0d1d75ed3e35990d3b7d7b19257386dc3d9ea333e3d27e86b22778c15a36c2dcfa9afd22035b8190082dbaae15bbeb41d767c49f56cd3e46575b628e26f8bc7d898867186720a581e20d9c07d16253f37d3ae5e93792ef08d8ac93bb478801594951a77bf9f8c90c589a28a3334771c57dee3604b4c36c6efa401571e0e1c6b4b82960d5857e9cc711d0e6a08ae4c3a0d59c2e918b8c30f8d374865f0c339b077b431cc8c9efdb3da6f436f48be02cfdc9ce63b0726d109b31a89c1cbb68853cf805874e9945030615b5b09de04993726a26f77cdeb4a02307ac6a7f76e34fdb71e92dbcde2820dcbd6d568e4c0945304c8c898cfa316d54977878df5adbe9e138341788e285c2929281c53111112e64ff735195538c44ebdd2addcd0cc48cd34589fdfb55af8761e49a2ec87adc62b4c9f638bce88b10e705ab4be7f51695b0b4d8f027e9fdc1555bd6c747cfcf63319f98a8db58776472dce66346b1165a199e39c166d5fb54ba0a8ed441768ffe032b472fb2805f73de2f6b84f260bc16f2d373f9782481da9e8a0f7fae15c6d2b5fc9408bfa2119b05bdb364626bc6a86d46389119cff8c9f50814d4495a27f3c47a1d7d16e3e7cb7ab5b25cb57b6179d23c9bc451c516f2d99dc44f064f63a6d6885ea577ddb532fcefde6890f8405a4afa67c16b1fff91c4b4aac00fb0bdecf86b75f33ae378c20f24bbbdb3e8a5cdd73f63e69ab0512c05f147672a476c3228eef3e2b775935834a80ed2beed0938ca4d6b4db35be1c47cd568ddcd6a6e84d7e0d009d1f4e2c095d5b53c06c9f309518a3d51c443139515c18c76902889a79a725aad8399963256495481edb09c0c705f0585d700f174aff047ff98ca47f297b8316da549448206d173502e78396ce8ae2869330e01ef7bfbea09aabe4bfdee6a9813503552d831e9ec9da6a6c2345c4e53ac6fe047937d1359bb35d4cfba15983c21c8acaf0192a19bd02bc15b713d162189770facf41414de65800cfd36f7c072a089153185ed19b3462ff816185f0ff9243af66a7c54ddc68ef385bbf12fd718f95ce740f875393af9cc335bc5583b883ebd2abea679035bb0399415939795a3145907c0fc6dbe9d641282dc992a2e66428bfc88997dfa58acc308808ba2f144d81c780c14dc193fd854b0aa39f6b11e9ce80a25cf7e033c4388001f2345de13ca4c05a0783c9e4a6bc17c127adfce99d390196c28d4d80e85a30edf010be3a09ad96355dd51cace150c6d571b3811a63cb354d0a676a1004bdb0aeafe26eed6d541ce2ee8f52747c1feb153fcb2c75acffd4e06a82408a1345d760a03d3f4e72f04d754ca605376907c5c3ee9484f59a2f7c3f1591c2175dd46bbbf6eac7445d409c6837b137fa9d0c63c13e00a6bb9eac51aefc00ffc99615bf6cadc14e308a8d64c81702a183238eaba2e1947686822c955a145f08a1d8453f427104f65a8af12a4e6396c2b50113bab0df7d03369f4e97ffaaa9a21fd93a38629a32188d3ee20313f75894c52f9a51352cb760ab2afe81c09c0c976e94f89129d92a56cb4498050cc24f439b0e02c2dddf652a9c4ae8aad21b67983f574a32dae4b69d3b141492361a0c0e3bacd72ac37994e672163f6cb27c2b2baa89b8f6ae22f0c182b8821a615668c2bdd1715ce043c786430ab18655334ba719de7fa8868fe7f0d64ee5983706cf1889a9ee4f9827a62d97ace3ff65c04bab8531f6ab44ec69179bd0eec4c46083a9f81a4558018a81cc4ed88e20bb5ff76fd89448f123a024a928f0a2017e321a9fc8a30082e3b271a688f78992ddffe8373c3781dba6433b1838a30cf685733e78c6a4945bf75643660ff1faecf990a4e3a80d01e28d1f5b842d3f31a1af5e7c45d782d9bc9ae88b31abd1ed49aad94534fdb568f611472928f040f8739048f0a0460b572d4d7f5ce3dab61643f0735284fe9fa7441b1659bf5ce2db65ba98f6506e817f77fb6d879d0163d4dc1ccdf9b29808dc5f327ea9a934f4ddbf2d003ebf2830d4c29a4d8e02ab5038247758369c86f551724e15a1a8c3e8ca0c8dd9fd304dd5f540d0348cd08e104f7c5bc4534f00e3d9db3fa8e6e1374542195d3bddf78dd5f7cc1df86e847a66053bcf2cca94adb5caf307e4f86f3aa2f4700f4ab26cecf7805e31efcc995527c5836c0172a5b20d7a612320f1c0197844fede840520a144fc44c93bc831b268204c0c173556d69a0f5052e11e88c44f8e6223aac89f80b571c2218dc61723da90e09daf5d45dbec41466a5b36bbbc3835b560ad7ac8578c600ad7a6beb0ab1cd55388ef5192788c4b9a9e5276b76dcce065a7863607851259582498198f5faa79db0f633b162aa9bae2122e8514dbe366e7d47462bfe23359118be9de54d332759e5c3a97ac5320c1fe9bc4a45947435544e6c69bd2aa89b72f52b4403df3ab939d28f5713d879808d02486d2c7e5a2a2859767d28ffbd70e9d55d38f58f776b1f5958966878045cca5ee0ebaf03cfd81679238ee87651f12ab37ce6b3c79ec284aa45bf2cb4a6ba006ed18dfa3e83bc0fc893b19fb4fa05c1289c94e896dfd78aabe29308a5198f0413132536301a02ce5ac8fc02e701bf210dad3ae6c60527049c21b1aa033c9a695624537ee08c6dc0f12b84e25e9dc6f24f9dc01bfb245ca13b448e5b700d867074e13bef654b8135bc6c66817360de742f0e2b885a967b8daf64c69df1587f5e6777f1d47ce904c293a8ba81298046554ca9d5f31e5c82c11c119a95f744a296b59b512cf95cca506e64ddbdeb8aa4e0f7df8a77f0f5e8745b8394b9a7152ced345ab749c20cf104d361e45dfbf0610043dac23d32bb97fbf52901a6b97d837401bfe7cc34dd436dff5d4488eb8550866f37c1065407522f8bfc8d4757cb79161c0d8772e2544f9b624a28b40a140ab703b79e96db337b71bc1dd8b1adf287c9cbb6fab86cfaf16d6e69b21be6048640d3a9fb7ceca06dbfb1176246ee43b0ff9f5d342e90e55c37f9374870698b328d7842fdf8c16cd494811845d0133643e9345ea9c1b38f743a898b96887fbfd1d30421744705f74041f72fc1d3eb1455d3a240e6a7cd537cadc84beebea94864916743e9640215f70e9d998d184ffda4acfaf01591b691b7e8dbe3be201ebd55501111766bdeb6b1f2df537df536a0345ed61f4af144bf0c32ecbee40d1adcaaaf26b5f3ad44799aa20b07235708879e92232c3c0ffb792a15433b550fd9ef0e9c22afa5250f6c27293198d819caf7954a32b97d657a896b909be5b9b7efe34e6e41600166bd9b9e121ab95df12d8a910d0f70d41ce1055bd4e83936c87f2edc5d16f4bc7a2fd81a5ac5f4c23a1042dee531bf490f3cc4c6d6d3300fe898df6e747c86010bcd5379f67db8640d17138ba16f064d2c7c8d6cad3842b80aca29077c75d93740919b1a202d2c944b91feb3e4f63967b45108b59b0af332a8e5aa456380ed37acbcf45808df79f5e1eb33b1cac5bab2c9e06fe6e82a128bdbb606fff43acb1c00b61342f33d5a4f3e2da53dca314cf0eba75fec6e5f45e4e1660524635cf1a79587c04cab97a35cd5558a2b1217188a7096494c3e4ab5985ce74eecdb4c092f5a6c7e4a3626edd14c548c85b43783cc9e81c9cc859e0f56b3947fe89d29bd217e6b52fdb72420af60cd0cd072c8f8a9d363aea061740f1759e19e8ad4e7c1ae16c87901410df9eff035f292de1cfec0e157633609b80a7dbdbf70c93e1cf2c59d069ee442d3607757a401f58a8203f8e3600cfedc30966c6e1121da8f590d9d185ff80f18bb110455fd51e2c3336081943b92f87889df387a50284f979ef1a64454cec866a27d3a10eca6a9e4b0b50bd892092c514027fa5f7d2dc13a1db3b38436b50467f07fe29f1209e03452e48ccf903a4ddc7ec3e2beedff8831fbb593f6d2f7a1e39e2129d005cbe8d6b433a974e8f47e04f78661f62dca1b8256008c9c868d57d9c7d7ddd85a8bfbe7cb619ad5ec24671629e50de009a9dc96c5bdefab4533bc9be90c048d63d8cebebc64ae762d6795da76083dba3d67bbf738bca5fe5d0e50ab78a7561fe17020be0123d1998ff29e448c5309b9ef449ec58db223d04d7e9c67a2801438b554bafbe79a683016722f80389d18674af27036ea936ab68efe2f09859e9789e8a23ee9f03d1a7e2dbbccf751f1d97384c9bef9c7efeaa16c45edce6d4c1958cd2f1d7156d7f0e3091ba5aba6a255d2e05b1b166ac1c0d93c0bffaa09a4251172f8df20305ae0300193624cbaa87abcb82976660d8a352e5aaa5a7af9031f84bda1e47e7b5369e50f9882acd6c0da0f7a5b2f69b3ebe0566", 0xd1f}], 0x6, &(0x7f0000002740)=[@cred], 0x20}, 0x0) [ 103.031969][ C0] sd 0:0:1:0: tag#3819 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 103.041853][ C0] sd 0:0:1:0: tag#3819 CDB: opcode=0xe5 (vendor) [ 103.048216][ C0] sd 0:0:1:0: tag#3819 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 103.057241][ C0] sd 0:0:1:0: tag#3819 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 103.066290][ C0] sd 0:0:1:0: tag#3819 CDB[20]: ba 07:43:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002680)={0x0, 0x0, &(0x7f00000024c0)=[{0x0}], 0x1}, 0x0) 07:43:55 executing program 0: pipe2(&(0x7f0000000000), 0x0) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) 07:43:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00') chown(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) [ 103.133499][ T2269] loop4: detected capacity change from 0 to 4 07:43:55 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:55 executing program 3: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') readlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/46, 0x2e) 07:43:55 executing program 0: munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 07:43:55 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) 07:43:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:55 executing program 1: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000)={0x3}, 0x8) 07:43:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 103.234990][ T24] kauditd_printk_skb: 42 callbacks suppressed [ 103.235002][ T24] audit: type=1400 audit(1641109435.202:142): avc: denied { map } for pid=2272 comm="syz-executor.1" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 103.236869][ T2276] loop4: detected capacity change from 0 to 4 07:43:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000000)={r3}, 0x8) 07:43:55 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x1203, &(0x7f00000000c0)=ANY=[], 0x3ef) [ 103.280680][ T24] audit: type=1400 audit(1641109435.252:143): avc: denied { setopt } for pid=2278 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 103.370208][ T2288] loop5: detected capacity change from 0 to 264192 07:43:55 executing program 2: getresgid(0x0, &(0x7f0000000040), 0x0) 07:43:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 07:43:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x450}}], 0x1c}, 0x0) 07:43:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000003bc0)={&(0x7f0000001800)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000003a80)=ANY=[@ANYBLOB="1c0000008400000004000000b40348008100000000ac1600", @ANYRES32=0x0, @ANYBLOB="14000000840000000700000001000000070000002c000000840000000200000001000600004a0000050000000f951412520e00009f3c000001000000", @ANYRES32=0x0, @ANYBLOB="1c000000840000000408000000000200000000002e550000", @ANYRES32=0x0, @ANYBLOB="10000000840000000800000001000000100000008400000009000000ffffffff1c000000840000000a000000000000000000000000000000000000011c000000840000000a000000ff0100000000000000000000000000012c00000084000000020000000500030020140000ff0000000180ffff0000000000feffff01000000", @ANYRES32, @ANYBLOB="1c"], 0x118}, 0x0) 07:43:55 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:55 executing program 1: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 07:43:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x3) 07:43:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x104, &(0x7f0000000240), &(0x7f0000000280)=0x4) [ 103.976331][ T2297] loop4: detected capacity change from 0 to 4 [ 103.981207][ T2298] loop5: detected capacity change from 0 to 264192 07:43:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000100)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000000), 0xc) 07:43:56 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@sndinfo={0x1c}, @prinfo={0x14, 0x84, 0x7, {0x2}}], 0x30}, 0x0) 07:43:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x81, &(0x7f00000001c0)) 07:43:56 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4008700c, &(0x7f0000000040)) 07:43:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x48, &(0x7f00000000c0)='\x00\x00\x00\x00', 0x4) [ 104.022677][ T24] audit: type=1400 audit(1641109435.992:144): avc: denied { read } for pid=2303 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 07:43:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x81, &(0x7f00000001c0)) 07:43:56 executing program 0: select(0x0, 0x0, 0xfffffffffffffffe, 0x0, &(0x7f0000000140)) 07:43:56 executing program 2: write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e02", 0x11) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x800454e0, 0x0) [ 104.113222][ T24] audit: type=1400 audit(1641109436.082:145): avc: denied { read } for pid=2318 comm="syz-executor.1" name="rtc0" dev="devtmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 104.158945][ T24] audit: type=1400 audit(1641109436.112:146): avc: denied { open } for pid=2318 comm="syz-executor.1" path="/dev/rtc0" dev="devtmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 104.182616][ T24] audit: type=1400 audit(1641109436.112:147): avc: denied { ioctl } for pid=2318 comm="syz-executor.1" path="/dev/rtc0" dev="devtmpfs" ino=219 ioctlcmd=0x700c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 07:43:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000180)=""/249, &(0x7f0000000280)=0xf9) 07:43:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x400000c1, 0x0, 0x0) 07:43:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002ac0)={&(0x7f0000000140)=@newtaction={0x48, 0x10, 0x401, 0x0, 0x0, {}, [{0x34, 0x1, [@m_skbmod={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 07:43:56 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x81, &(0x7f00000001c0)) 07:43:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001140)=@newtfilter={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x4}}, [@TCA_RATE={0x6}]}, 0x2c}}, 0x0) 07:43:56 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0182101, &(0x7f0000000040)) 07:43:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f00000000c0)="3c2c9747f5712e023f6623aef59d3ed11110c466", 0x14) 07:43:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x81, &(0x7f00000001c0)) [ 104.247153][ T2327] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 07:43:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002ac0)={&(0x7f0000000140)=@newtaction={0x18, 0x30, 0x401, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) 07:43:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{}, {0x15}, {0x6}]}) 07:43:56 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x40247007, &(0x7f0000000040)={0x0, 0x0, 0xfffffdfd}) [ 104.302631][ T2332] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 104.315665][ T24] audit: type=1326 audit(1641109436.282:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2333 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f81180aae99 code=0x0 [ 104.334919][ T2338] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:43:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x1c}, {0x6}]}) 07:43:56 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet6(r0, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}], 0x2, 0x0) [ 104.366435][ T24] audit: type=1326 audit(1641109436.332:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2341 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f27d9c79e99 code=0x0 [ 104.366702][ T2344] loop5: detected capacity change from 0 to 264192 07:43:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x81, &(0x7f00000001c0)) [ 104.406814][ T24] audit: type=1326 audit(1641109436.372:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2346 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7d18a0fe99 code=0x0 [ 104.441984][ T2353] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:43:56 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@vsock={0x28, 0x0, 0x4e22, @my=0x0}, 0x80) 07:43:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) [ 104.573095][ T24] audit: type=1400 audit(1641109436.542:151): avc: denied { setopt } for pid=2356 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 104.632831][ T2359] loop5: detected capacity change from 0 to 264192 07:43:57 executing program 3: openat$hwrng(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 07:43:57 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet6(r0, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@flowinfo={{0x14}}], 0x18}}], 0x2, 0x0) 07:43:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x81, &(0x7f00000001c0)) 07:43:57 executing program 1: openat$hwrng(0xffffff9c, &(0x7f0000000000), 0x24000, 0x0) 07:43:57 executing program 0: r0 = epoll_create(0x7) epoll_pwait(r0, &(0x7f00000008c0)=[{}], 0x1, 0x0, 0x0, 0x0) 07:43:57 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:43:57 executing program 1: openat$bsg(0xffffff9c, &(0x7f0000000100), 0x6100, 0x0) 07:43:57 executing program 2: io_cancel(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 07:43:57 executing program 0: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x77359400}) [ 105.147689][ T2363] loop5: detected capacity change from 0 to 264192 [ 105.162429][ T2368] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:43:57 executing program 3: r0 = socket(0x11, 0x3, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), r0) 07:43:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@empty, @remote, @rand_addr=' \x01\x00', 0x0, 0x0, 0xda25}) 07:43:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14}, 0x14}, 0x7}, 0x0) 07:43:57 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) request_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='syz', 0x0) 07:43:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffff74) 07:43:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) 07:43:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 105.273939][ T2387] loop4: detected capacity change from 0 to 4 [ 105.304561][ T2387] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:43:57 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffa) 07:43:57 executing program 3: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000000240)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5437, 0x0) 07:43:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8943, &(0x7f0000000140)={'sit0\x00', 0x0}) [ 105.325562][ T2393] debugfs: File 'dropped' in directory 'loop6' already present! [ 105.350373][ T2393] debugfs: File 'msg' in directory 'loop6' already present! 07:43:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5422, 0x0) 07:43:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:57 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x541d, 0x0) 07:43:57 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x4b2f, 0x0) 07:43:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x3, 0x0, 0x0) 07:43:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)='u', 0x1}], 0x1, &(0x7f00000003c0)=[{0x10}, {0x10}], 0x20}}], 0x1, 0x0) 07:43:57 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x540e, 0x0) [ 105.413457][ T2399] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure [ 105.429683][ T2403] loop4: detected capacity change from 0 to 4 [ 105.430350][ T2403] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:43:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x541b, &(0x7f0000000380)={'ip6_vti0\x00', 0x0}) [ 105.519308][ T2416] loop5: detected capacity change from 0 to 264192 [ 105.521043][ T2417] loop4: detected capacity change from 0 to 4 [ 105.536983][ C0] scsi_io_completion_action: 5 callbacks suppressed [ 105.537010][ C0] sd 0:0:1:0: tag#3829 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 105.553901][ C0] sd 0:0:1:0: tag#3829 CDB: opcode=0xe5 (vendor) [ 105.560277][ C0] sd 0:0:1:0: tag#3829 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 07:43:57 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffa) 07:43:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@private1}, 0x14) 07:43:57 executing program 1: select(0x5f, &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x7}, 0x0, 0x0) 07:43:57 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x4b37, 0x0) 07:43:57 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = fsopen(&(0x7f0000000080)='fuseblk\x00', 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10002}, 0xc, 0x0}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_genetlink_get_family_id$batadv(0x0, r1) socket$inet(0x2, 0xa, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) fsmount(r0, 0x1, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 07:43:57 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x4b30, 0x0) [ 105.569317][ C0] sd 0:0:1:0: tag#3829 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 105.576683][ T2417] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 105.578355][ C0] sd 0:0:1:0: tag#3829 CDB[20]: ba 07:43:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @private}, 0xc) 07:43:57 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) accept4$packet(r0, 0x0, 0x0, 0x7c29ba77f86c349b) 07:43:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f4, &(0x7f0000000140)={'sit0\x00', 0x0}) 07:43:57 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffa) [ 105.616551][ T2424] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 105.629187][ C0] sd 0:0:1:0: tag#3830 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 105.639043][ C0] sd 0:0:1:0: tag#3830 CDB: opcode=0xe5 (vendor) 07:43:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) 07:43:57 executing program 1: recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x40000102, 0x0, 0x0) [ 105.639088][ C0] sd 0:0:1:0: tag#3830 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 07:43:57 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r0, r3, 0x0, 0x8400fffffffa) 07:43:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000000)="9f", 0x1) 07:43:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)) [ 105.639106][ C0] sd 0:0:1:0: tag#3830 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 105.639132][ C0] sd 0:0:1:0: tag#3830 CDB[20]: ba [ 105.686791][ T2440] loop5: detected capacity change from 0 to 264192 [ 105.688387][ T2441] loop4: detected capacity change from 0 to 4 [ 105.693768][ T2441] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 105.696152][ C0] sd 0:0:1:0: tag#3831 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 105.696178][ C0] sd 0:0:1:0: tag#3831 CDB: opcode=0xe5 (vendor) [ 105.696198][ C0] sd 0:0:1:0: tag#3831 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 105.696221][ C0] sd 0:0:1:0: tag#3831 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 07:43:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000001c0)=ANY=[], 0x190) 07:43:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:57 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, 0x0, 0x0) 07:43:57 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 07:43:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) [ 105.696238][ C0] sd 0:0:1:0: tag#3831 CDB[20]: ba [ 105.773018][ T2448] loop5: detected capacity change from 0 to 264192 [ 105.781482][ C0] sd 0:0:1:0: tag#3833 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 105.831273][ C0] sd 0:0:1:0: tag#3833 CDB: opcode=0xe5 (vendor) [ 105.837654][ C0] sd 0:0:1:0: tag#3833 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 105.846697][ C0] sd 0:0:1:0: tag#3833 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 105.855759][ C0] sd 0:0:1:0: tag#3833 CDB[20]: ba 07:43:57 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLOCK(r0, 0x0, 0x0) 07:43:57 executing program 2: pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, 0x0, 0x0) 07:43:57 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 07:43:57 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x2080, 0x0) [ 105.880167][ T2455] loop4: detected capacity change from 0 to 4 [ 105.916523][ T2455] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:43:57 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r0, r3, 0x0, 0x8400fffffffa) 07:43:57 executing program 1: syz_emit_ethernet(0x101e, 0x0, 0x0) 07:43:57 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 07:43:57 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x432082, 0x0) 07:43:57 executing program 3: pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000040)=ANY=[], 0x74) 07:43:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:57 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x4dc0, 0x0) 07:43:57 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 07:43:57 executing program 1: syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) 07:43:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000004c80)=[{{&(0x7f00000001c0)=@in={0x2, 0x4e24, @local}, 0x80, 0x0}}], 0x1, 0x8010) 07:43:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'sit0\x00', &(0x7f00000016c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @remote}}) 07:43:58 executing program 2: io_setup(0x4c5, &(0x7f0000000180)) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) [ 106.022287][ T2482] loop4: detected capacity change from 0 to 4 [ 106.055280][ T2482] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 106.096508][ T2494] loop5: detected capacity change from 0 to 264192 [ 106.127322][ C1] sd 0:0:1:0: tag#3834 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 106.137282][ C1] sd 0:0:1:0: tag#3834 CDB: opcode=0xe5 (vendor) [ 106.143619][ C1] sd 0:0:1:0: tag#3834 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 106.152630][ C1] sd 0:0:1:0: tag#3834 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 106.161647][ C1] sd 0:0:1:0: tag#3834 CDB[20]: ba 07:43:58 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r0, r3, 0x0, 0x8400fffffffa) 07:43:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty, 0x0, 0x700}}) 07:43:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, 0x700}}) 07:43:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001280)=[{{&(0x7f0000000080)={0x2, 0x4e20, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x1c) 07:43:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058e", 0x68, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x1d, 0x0, &(0x7f0000000040)) 07:43:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x6, 0x0, 0x7000000) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x29, 0x7, 0x84, 0x6, 0x1, @local, @mcast1, 0x8000, 0x10, 0x1, 0x18000}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl0\x00', r1, 0x29, 0x2, 0x80, 0x800, 0x3c, @private2={0xfc, 0x2, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xe00, 0x8, 0xfff, 0x3752c0c3}}) 07:43:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x5, 0x0, &(0x7f0000000040)) 07:43:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000140)=@un=@file={0x0, './file0\x00'}, 0x80) 07:43:58 executing program 2: r0 = socket(0x2, 0x3, 0xbf) sendmsg$AUDIT_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 07:43:58 executing program 0: io_setup(0x0, &(0x7f0000000180)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x8901, &(0x7f0000000140)) [ 106.255527][ T2502] loop4: detected capacity change from 0 to 4 [ 106.271705][ T2502] EXT4-fs (loop4): unsupported descriptor size 0 07:43:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0, 0x0) [ 106.389117][ T2518] loop5: detected capacity change from 0 to 264192 [ 106.400220][ C0] sd 0:0:1:0: tag#3835 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 106.410070][ C0] sd 0:0:1:0: tag#3835 CDB: opcode=0xe5 (vendor) [ 106.416484][ C0] sd 0:0:1:0: tag#3835 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 106.425628][ C0] sd 0:0:1:0: tag#3835 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 106.434681][ C0] sd 0:0:1:0: tag#3835 CDB[20]: ba 07:43:58 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:43:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001a80)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, &(0x7f00000013c0)=[{0x0}, {&(0x7f0000000140)='L', 0x1}, {&(0x7f00000001c0)='4', 0x1}], 0x3, &(0x7f0000001440)=[@hopopts_2292={{0x18}}], 0x18}}], 0x1, 0x0) 07:43:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8924, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 07:43:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001280)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@pktinfo={{0x24, 0x11, 0x32, {@private0}}}], 0x28}}], 0x1, 0x0) 07:43:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @ipv4={'\x00', '\xff\xff', @multicast1}}}) 07:43:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058e", 0x68, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f00000002c0)) 07:43:58 executing program 2: r0 = socket(0x2, 0x3, 0xbf) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f0, &(0x7f0000000b00)={'sit0\x00', 0x0}) 07:43:58 executing program 3: io_setup(0x6, &(0x7f0000000000)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000080)=[{}, {}, {}], &(0x7f0000000300)={0x0, 0x989680}) 07:43:58 executing program 1: io_setup(0x8, &(0x7f0000000000)=0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000280)={0x420}, 0x420}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)='k', 0x1}]) 07:43:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x10, 0x0, &(0x7f0000000840)) 07:43:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 106.525586][ T2528] loop4: detected capacity change from 0 to 4 [ 106.560131][ T2528] EXT4-fs (loop4): unsupported descriptor size 0 [ 106.640051][ T2543] loop5: detected capacity change from 0 to 264192 07:43:58 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:43:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:43:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@setlink={0x24, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) 07:43:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001200)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee00], 0x40}, 0x0) 07:43:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000009c0)=[{{&(0x7f0000000000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000340)=ANY=[], 0x128}}], 0x1, 0x0) 07:43:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058e", 0x68, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:58 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') 07:43:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:43:58 executing program 3: setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, &(0x7f0000000040)) 07:43:58 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/user\x00') read(r0, 0x0, 0x0) 07:43:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) 07:43:58 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fdinfo/4\x00') [ 106.760327][ T2552] loop4: detected capacity change from 0 to 4 [ 106.831330][ T2552] EXT4-fs (loop4): unsupported descriptor size 0 [ 106.880213][ T2569] loop5: detected capacity change from 0 to 264192 07:43:58 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:43:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:43:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='wchan\x00') fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v3, 0x18, 0x0) 07:43:58 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @phonet, @vsock={0x28, 0x0, 0x0, @host}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}}) 07:43:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/icmp\x00') read$usbmon(r0, 0x0, 0x0) 07:43:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d90674", 0x9c, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:58 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x4000, 0x0) 07:43:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 07:43:59 executing program 1: modify_ldt$write(0x1, &(0x7f0000000000)={0x388}, 0x10) 07:43:59 executing program 3: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) times(&(0x7f00000000c0)) [ 106.995952][ T2577] loop4: detected capacity change from 0 to 4 07:43:59 executing program 1: setpriority(0x0, 0x0, 0x1) setpriority(0x0, 0x0, 0x0) 07:43:59 executing program 0: r0 = gettid() setpriority(0x0, r0, 0x1) [ 107.051489][ T2577] EXT4-fs (loop4): unsupported descriptor size 0 [ 107.101469][ T2595] loop5: detected capacity change from 0 to 264192 07:43:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 07:43:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x0, 0x40000000}, 0xc) 07:43:59 executing program 1: r0 = gettid() sched_setscheduler(r0, 0x2, &(0x7f0000000080)) 07:43:59 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:43:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d90674", 0x9c, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) 07:43:59 executing program 0: timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f0000000040)) 07:43:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs_stats_percpu\x00') ioctl$EVIOCSFF(r0, 0x40304580, 0x0) 07:43:59 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000240)={@link_local, @remote, @val={@void, {0x8100, 0x1}}, {@ipv6={0x86dd, @udp={0x0, 0x6, "52300e", 0xc, 0x11, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, {[], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) 07:43:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) [ 107.217312][ T2600] loop4: detected capacity change from 0 to 4 07:43:59 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 07:43:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000300)={0x9}, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) 07:43:59 executing program 1: futex(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) [ 107.273280][ T2600] EXT4-fs (loop4): unsupported descriptor size 0 [ 107.320487][ T2623] loop5: detected capacity change from 0 to 264192 [ 107.343920][ C0] sd 0:0:1:0: tag#3836 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 107.353792][ C0] sd 0:0:1:0: tag#3836 CDB: opcode=0xe5 (vendor) [ 107.360154][ C0] sd 0:0:1:0: tag#3836 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 107.369191][ C0] sd 0:0:1:0: tag#3836 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 107.378244][ C0] sd 0:0:1:0: tag#3836 CDB[20]: ba 07:43:59 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:43:59 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) 07:43:59 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) r1 = gettid() fcntl$lock(r0, 0x25, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, r1}) 07:43:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:43:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d90674", 0x9c, 0x400}], 0x81, &(0x7f00000001c0)) 07:43:59 executing program 1: setitimer(0x2, &(0x7f0000000000)={{0x0, 0x2710}, {0x77359400}}, 0x0) 07:43:59 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000000)={@empty, @empty, @val={@void}, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @empty, @rand_addr=' \x01\x00', @dev, @loopback}}}}, 0x0) 07:43:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:43:59 executing program 1: timer_create(0x0, &(0x7f0000000200)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000240)) 07:43:59 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0) [ 107.466605][ T2630] loop4: detected capacity change from 0 to 4 [ 107.485892][ T2630] EXT4-fs (loop4): unsupported descriptor size 0 [ 107.570313][ T2646] loop5: detected capacity change from 0 to 264192 [ 107.581868][ C1] sd 0:0:1:0: tag#3837 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 107.591702][ C1] sd 0:0:1:0: tag#3837 CDB: opcode=0xe5 (vendor) [ 107.598140][ C1] sd 0:0:1:0: tag#3837 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 107.607249][ C1] sd 0:0:1:0: tag#3837 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 107.616292][ C1] sd 0:0:1:0: tag#3837 CDB[20]: ba 07:44:00 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000001240)={{0x0, 0x989680}, {0x77359400}}, 0x0) 07:44:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:00 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') 07:44:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) tee(r0, 0xffffffffffffffff, 0xffffffffffff39b5, 0x0) 07:44:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862", 0xb6, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:00 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:44:00 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000000600)=[{&(0x7f0000000040)=""/109, 0x6d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001780)=[{&(0x7f00000006c0)=""/4096, 0x1000}], 0x1, 0x0) 07:44:00 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/dev\x00') 07:44:00 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x5}, &(0x7f0000000080)={0x8}, 0x0) 07:44:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 108.135481][ T2653] loop4: detected capacity change from 0 to 4 [ 108.149453][ T2659] loop5: detected capacity change from 0 to 264192 07:44:00 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fcntl$getflags(r0, 0xb) 07:44:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862", 0xb6, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:00 executing program 0: setreuid(0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 108.177650][ T2653] EXT4-fs (loop4): unsupported descriptor size 0 [ 108.216965][ C0] sd 0:0:1:0: tag#3838 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 07:44:00 executing program 3: socket(0x10, 0x3, 0xffffffe0) 07:44:00 executing program 1: r0 = epoll_create(0x4) r1 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000100)) 07:44:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:00 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x4080, 0x0) [ 108.226831][ C0] sd 0:0:1:0: tag#3838 CDB: opcode=0xe5 (vendor) [ 108.233221][ C0] sd 0:0:1:0: tag#3838 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.234242][ T2673] loop4: detected capacity change from 0 to 4 [ 108.242279][ C0] sd 0:0:1:0: tag#3838 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.242297][ C0] sd 0:0:1:0: tag#3838 CDB[20]: ba [ 108.282703][ T2673] EXT4-fs (loop4): unsupported descriptor size 0 07:44:00 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:44:00 executing program 1: process_vm_writev(0x0, &(0x7f0000002500)=[{&(0x7f0000000080)=""/82, 0x52}, {&(0x7f0000000100)=""/220, 0xdc}, {&(0x7f0000000200)=""/189, 0xbd}, {&(0x7f00000002c0)=""/35, 0x23}, {&(0x7f0000000300)=""/222, 0xde}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/4085, 0xff5}, {&(0x7f0000002400)=""/203, 0xffffffffffffff25}], 0x8, &(0x7f00000025c0)=[{&(0x7f0000002580)=""/7, 0x7}], 0x1, 0x0) 07:44:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x1a, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 07:44:00 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/nf_conntrack_sip', 0x0, 0x0) 07:44:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862", 0xb6, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:00 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 07:44:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000001c0)={'syztnl0\x00', 0x0}) 07:44:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001080)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x9, 0x0) 07:44:00 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) tee(r0, r1, 0x2, 0x0) 07:44:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), r0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000380)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 07:44:00 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) write(r0, 0x0, 0x0) [ 108.415653][ T2695] loop4: detected capacity change from 0 to 4 [ 108.444528][ T2695] EXT4-fs (loop4): unsupported descriptor size 0 [ 108.569700][ T2713] loop5: detected capacity change from 0 to 264192 [ 108.582247][ C0] sd 0:0:1:0: tag#3779 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 108.592091][ C0] sd 0:0:1:0: tag#3779 CDB: opcode=0xe5 (vendor) [ 108.598457][ C0] sd 0:0:1:0: tag#3779 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 108.607472][ C0] sd 0:0:1:0: tag#3779 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 108.616487][ C0] sd 0:0:1:0: tag#3779 CDB[20]: ba 07:44:00 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:44:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:00 executing program 3: syz_emit_ethernet(0x80, &(0x7f0000000180)=ANY=[@ANYBLOB="0500aaeaaabbaaaaaaaaaaaa08"], 0x0) 07:44:00 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000280), &(0x7f00000002c0)={0x8001}, 0x0, 0x0, &(0x7f00000003c0)={0x0}) 07:44:00 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/wireless\x00') 07:44:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a46318", 0xc3, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:00 executing program 0: ustat(0x9, &(0x7f0000000040)) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000180)) 07:44:00 executing program 3: syz_open_procfs(0x0, &(0x7f00000000c0)='net/nf_conntrack\x00') [ 108.708302][ T2721] loop4: detected capacity change from 0 to 4 [ 108.741196][ T24] kauditd_printk_skb: 11 callbacks suppressed 07:44:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:00 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) ioctl(r0, 0x2, &(0x7f0000000600)="a5") 07:44:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) preadv(r0, &(0x7f0000002440)=[{0x0}, {&(0x7f0000000040)=""/4, 0x4}], 0x2, 0x0, 0x0) [ 108.741208][ T24] audit: type=1400 audit(1641109440.712:163): avc: denied { getattr } for pid=2727 comm="syz-executor.0" name="/" dev="dmabuf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 108.770801][ T2721] EXT4-fs (loop4): unsupported descriptor size 0 [ 108.855848][ T2740] loop5: detected capacity change from 0 to 264192 07:44:00 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:44:00 executing program 1: set_mempolicy(0x1, &(0x7f0000000000)=0x7f, 0x5) 07:44:00 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='setgroups\x00') 07:44:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0x100000001, 0x6f) 07:44:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a46318", 0xc3, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:00 executing program 3: futex(&(0x7f0000000240), 0x0, 0x1, 0x0, 0x0, 0x0) 07:44:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) writev(r0, 0x0, 0x0) 07:44:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fcntl$getflags(r0, 0x401) 07:44:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 108.959284][ T2745] loop4: detected capacity change from 0 to 4 07:44:01 executing program 0: sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x180e00678e1e562b) [ 109.007954][ T2745] EXT4-fs (loop4): unsupported descriptor size 0 [ 109.069480][ T2767] loop5: detected capacity change from 0 to 264192 07:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:01 executing program 3: prlimit64(0x0, 0x4, &(0x7f0000000080)={0x0, 0x1ff}, 0x0) 07:44:01 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) 07:44:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, 0x0, 0x0, 0x0, 0x6) 07:44:01 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:44:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a46318", 0xc3, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:01 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/bus/pci', 0x920c1, 0x0) 07:44:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$lock(r0, 0x4c, 0x0) 07:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:01 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') 07:44:01 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_targets\x00') 07:44:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}, @empty}}) 07:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fcntl$getflags(r0, 0x40a) [ 109.183784][ T2774] loop4: detected capacity change from 0 to 4 [ 109.216584][ T2774] EXT4-fs (loop4): unsupported descriptor size 0 07:44:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000000eb72d"], 0x14}}, 0x0) 07:44:01 executing program 1: syz_emit_ethernet(0x19, &(0x7f0000000040)={@empty, @local, @val, {@llc_tr={0x11, {@llc={0x0, 0x0, '#'}}}}}, 0x0) [ 109.316683][ T2802] loop5: detected capacity change from 0 to 264192 07:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:01 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) preadv(r0, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:44:01 executing program 1: timer_create(0x7, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, r0+60000000}}, &(0x7f0000000140)) 07:44:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 07:44:01 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:44:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52", 0xca, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:01 executing program 1: syz_emit_ethernet(0x80, &(0x7f0000000180)=ANY=[], 0x0) 07:44:01 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 07:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:01 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000040)={{0x0, r0/1000+60000}}, 0x0) [ 109.435196][ T2809] loop4: detected capacity change from 0 to 4 07:44:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/18, 0x12}, {&(0x7f00000002c0)=""/228, 0xe4}], 0x2, 0x0, 0x0) 07:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:01 executing program 3: modify_ldt$write(0x1, &(0x7f0000000000), 0x10) modify_ldt$write(0x1, &(0x7f00000000c0), 0x10) 07:44:01 executing program 0: r0 = getpid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x4, @tid=r0}, 0x0) 07:44:01 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000280), &(0x7f00000002c0)={0x8001}, &(0x7f0000000300)={0x9}, 0x0, 0x0) [ 109.480881][ T2809] EXT4-fs (loop4): unsupported descriptor size 0 [ 109.575529][ T2838] loop5: detected capacity change from 0 to 264192 07:44:01 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:01 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x100008000038) 07:44:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$lock(r0, 0x7, &(0x7f0000000100)) 07:44:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52", 0xca, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) pwrite64(r0, 0x0, 0x0, 0x0) 07:44:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000100)) 07:44:01 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) flistxattr(r0, &(0x7f0000000000)=""/35, 0x23) 07:44:01 executing program 0: futex(&(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0) 07:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:01 executing program 1: syz_emit_ethernet(0x56, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa"], 0x0) [ 109.680796][ T24] audit: type=1400 audit(1641109441.652:164): avc: denied { lock } for pid=2844 comm="syz-executor.1" path="socket:[19694]" dev="sockfs" ino=19694 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 109.681003][ T2847] loop4: detected capacity change from 0 to 4 07:44:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) [ 109.764767][ T2847] EXT4-fs (loop4): unsupported descriptor size 0 [ 109.833441][ T2864] loop5: detected capacity change from 0 to 264192 07:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:01 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:01 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xfffdfffffffffe01, 0x0) 07:44:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) dup2(r1, r0) 07:44:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52", 0xca, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="ca", 0x1}], 0x1) 07:44:01 executing program 3: syz_emit_ethernet(0x80, &(0x7f0000000180)=ANY=[@ANYBLOB="0500aaeaaabbaaaaaaaaaaaa0805"], 0x0) [ 109.935202][ T2869] loop4: detected capacity change from 0 to 4 [ 109.953589][ T2869] EXT4-fs (loop4): unsupported descriptor size 0 [ 110.041382][ T2880] loop5: detected capacity change from 0 to 264192 07:44:02 executing program 0: timer_create(0x3, 0x0, &(0x7f0000000540)) timer_delete(0x0) 07:44:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b68", 0xcd, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x185, 0x0) writev(r0, 0x0, 0x0) 07:44:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:02 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) times(&(0x7f00000000c0)) 07:44:02 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:02 executing program 3: r0 = epoll_create(0x8) read(r0, 0x0, 0x0) 07:44:02 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_matches\x00') 07:44:02 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:02 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) ioctl(r0, 0x2, &(0x7f0000000600)) 07:44:02 executing program 0: futex(0x0, 0xc, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080), 0x0) [ 110.615093][ T2888] loop4: detected capacity change from 0 to 4 [ 110.619225][ T2890] loop5: detected capacity change from 0 to 264192 [ 110.630634][ T2888] EXT4-fs (loop4): unsupported descriptor size 0 07:44:02 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:02 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) preadv(r0, &(0x7f00000003c0)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/228, 0xe4}], 0x3, 0x0, 0x0) 07:44:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b68", 0xcd, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:02 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:02 executing program 1: ustat(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000000c0)=""/179) 07:44:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) read(r0, &(0x7f0000000200)=""/126, 0x7e) [ 110.681070][ C0] scsi_io_completion_action: 3 callbacks suppressed [ 110.681096][ C0] sd 0:0:1:0: tag#3783 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 110.697574][ C0] sd 0:0:1:0: tag#3783 CDB: opcode=0xe5 (vendor) [ 110.703933][ C0] sd 0:0:1:0: tag#3783 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 110.712997][ C0] sd 0:0:1:0: tag#3783 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 110.722055][ C0] sd 0:0:1:0: tag#3783 CDB[20]: ba [ 110.731932][ T2908] loop4: detected capacity change from 0 to 4 [ 110.743181][ T24] audit: type=1400 audit(1641109442.712:165): avc: denied { read } for pid=2909 comm="syz-executor.3" path="socket:[19816]" dev="sockfs" ino=19816 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 110.773748][ T2908] EXT4-fs (loop4): unsupported descriptor size 0 07:44:02 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:02 executing program 1: clock_nanosleep(0x6, 0x0, 0x0, 0x0) 07:44:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x2}) 07:44:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b68", 0xcd, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:02 executing program 1: futex(&(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}, 0x0, 0x0) 07:44:02 executing program 0: pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000200)={0x3}, &(0x7f0000000240)={0x0, 0x3938700}, 0x0) 07:44:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:02 executing program 1: timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}}, 0x0) 07:44:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 110.868456][ T2926] loop4: detected capacity change from 0 to 4 [ 110.888963][ T2926] EXT4-fs (loop4): unsupported descriptor size 0 [ 110.973013][ T2943] loop5: detected capacity change from 0 to 264192 [ 110.987723][ C1] sd 0:0:1:0: tag#3784 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 110.997559][ C1] sd 0:0:1:0: tag#3784 CDB: opcode=0xe5 (vendor) [ 111.003932][ C1] sd 0:0:1:0: tag#3784 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 111.013177][ C1] sd 0:0:1:0: tag#3784 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 111.022202][ C1] sd 0:0:1:0: tag#3784 CDB[20]: ba 07:44:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:03 executing program 1: mq_unlink(&(0x7f0000000200)='({*((!+**\x00') 07:44:03 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c09", 0xcf, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:03 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x24c0, 0x0) 07:44:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 07:44:03 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000100)={0x0, 0x1}) 07:44:03 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000300)={0x9}, 0x0, 0x0) 07:44:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 111.591211][ T2949] loop4: detected capacity change from 0 to 4 [ 111.599483][ T2954] loop5: detected capacity change from 0 to 264192 [ 111.628876][ T2949] EXT4-fs (loop4): unsupported descriptor size 0 07:44:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x1}) 07:44:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 111.636684][ T2957] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2957 comm=syz-executor.3 [ 111.669920][ C1] sd 0:0:1:0: tag#3785 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 111.679774][ C1] sd 0:0:1:0: tag#3785 CDB: opcode=0xe5 (vendor) 07:44:03 executing program 3: prlimit64(0x0, 0xb, &(0x7f0000000000), 0x0) 07:44:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c09", 0xcf, 0x400}], 0x81, &(0x7f00000001c0)) 07:44:03 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100)={[0x3]}, 0x8}) [ 111.686109][ C1] sd 0:0:1:0: tag#3785 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 111.695188][ C1] sd 0:0:1:0: tag#3785 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 111.704227][ C1] sd 0:0:1:0: tag#3785 CDB[20]: ba [ 111.722107][ T2970] loop4: detected capacity change from 0 to 4 [ 111.759394][ T2970] EXT4-fs (loop4): unsupported descriptor size 0 07:44:03 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:03 executing program 3: sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001bc0), 0x301000, 0x0) 07:44:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) flistxattr(r0, &(0x7f0000000000)=""/35, 0x23) 07:44:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c09", 0xcf, 0x400}], 0x81, &(0x7f00000001c0)) [ 111.850144][ T2982] loop4: detected capacity change from 0 to 4 [ 111.871250][ T2982] EXT4-fs (loop4): unsupported descriptor size 0 [ 111.939248][ T2985] loop5: detected capacity change from 0 to 264192 [ 111.951793][ C1] sd 0:0:1:0: tag#3786 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 111.961732][ C1] sd 0:0:1:0: tag#3786 CDB: opcode=0xe5 (vendor) [ 111.968086][ C1] sd 0:0:1:0: tag#3786 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 111.977097][ C1] sd 0:0:1:0: tag#3786 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 111.986112][ C1] sd 0:0:1:0: tag#3786 CDB[20]: ba 07:44:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$lock(r0, 0x5, &(0x7f0000000100)) 07:44:04 executing program 0: timer_create(0x2, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x3938700}, {0x0, r0+10000000}}, 0x0) 07:44:04 executing program 3: timer_create(0x1, 0x0, &(0x7f0000001140)) 07:44:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x7}}]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0}], 0x81, &(0x7f00000001c0)) 07:44:04 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:04 executing program 3: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs2/custom1\x00') 07:44:04 executing program 0: timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000240)=""/233) 07:44:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfa, 0xfa, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x117}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:04 executing program 1: syz_open_dev$evdev(&(0x7f0000000000), 0x10000, 0x0) [ 112.486643][ T2993] loop5: detected capacity change from 0 to 264192 [ 112.496726][ T2997] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:44:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0}], 0x81, &(0x7f00000001c0)) 07:44:04 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000001180)={0x0, 0x0, 0xfffffffffffffffc}) 07:44:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfa, 0xfa, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x117}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:04 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') 07:44:04 executing program 1: futex(&(0x7f0000000000), 0x8, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 112.574724][ T3011] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 112.588797][ C1] sd 0:0:1:0: tag#3787 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 112.598759][ C1] sd 0:0:1:0: tag#3787 CDB: opcode=0xe5 (vendor) [ 112.605092][ C1] sd 0:0:1:0: tag#3787 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 112.614140][ C1] sd 0:0:1:0: tag#3787 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 07:44:04 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x418002, 0x0) 07:44:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) preadv(r0, 0x0, 0x0, 0x0, 0x0) 07:44:04 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:04 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_names\x00') 07:44:04 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) 07:44:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfa, 0xfa, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x117}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 112.623182][ C1] sd 0:0:1:0: tag#3787 CDB[20]: ba 07:44:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0}], 0x81, &(0x7f00000001c0)) 07:44:04 executing program 1: set_mempolicy(0x0, &(0x7f00000000c0), 0x9) 07:44:04 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/llc/socket\x00') 07:44:04 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) write$cgroup_type(r0, 0x0, 0x0) 07:44:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x40040c1) 07:44:04 executing program 0: clock_gettime(0x6, &(0x7f00000001c0)) 07:44:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, 0x0) 07:44:04 executing program 0: socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) [ 112.696446][ T3035] loop5: detected capacity change from 0 to 264192 [ 112.703393][ T3031] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:44:04 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x0, 0x7}}, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:04 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080), 0x0) 07:44:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x0, &(0x7f00000001c0)) 07:44:04 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) [ 112.756882][ C1] sd 0:0:1:0: tag#3788 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 112.766766][ C1] sd 0:0:1:0: tag#3788 CDB: opcode=0xe5 (vendor) [ 112.773123][ C1] sd 0:0:1:0: tag#3788 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 112.782175][ C1] sd 0:0:1:0: tag#3788 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 112.791219][ C1] sd 0:0:1:0: tag#3788 CDB[20]: ba 07:44:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fcntl$lock(r0, 0x5, 0x0) 07:44:04 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x402, 0x8000001c) 07:44:04 executing program 1: setitimer(0x1, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, &(0x7f0000000140)) [ 112.816139][ T3052] loop4: detected capacity change from 0 to 4 [ 112.845552][ T3052] EXT4-fs (loop4): couldn't mount RDWR because of unsupported optional features (8e040000) 07:44:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd5, 0xd5, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xf3}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x0, &(0x7f00000001c0)) 07:44:04 executing program 1: syz_open_dev$evdev(&(0x7f0000000000), 0xffffffffffff1621, 0x0) [ 112.868991][ T24] audit: type=1400 audit(1641109444.842:166): avc: denied { watch } for pid=3063 comm="syz-executor.3" path="/dev/bsg" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=dir permissive=1 [ 112.918859][ T3072] loop5: detected capacity change from 0 to 264192 [ 112.938005][ T3075] loop4: detected capacity change from 0 to 4 [ 112.941381][ C1] sd 0:0:1:0: tag#3789 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 112.954047][ C1] sd 0:0:1:0: tag#3789 CDB: opcode=0xe5 (vendor) [ 112.960406][ C1] sd 0:0:1:0: tag#3789 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 07:44:04 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:04 executing program 3: setpriority(0x0, 0x0, 0x1) 07:44:04 executing program 1: ustat(0x6, &(0x7f0000000080)) 07:44:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd5, 0xd5, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xf3}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 112.969446][ C1] sd 0:0:1:0: tag#3789 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 112.978484][ C1] sd 0:0:1:0: tag#3789 CDB[20]: ba [ 112.981123][ T3075] EXT4-fs (loop4): couldn't mount RDWR because of unsupported optional features (8e040000) [ 113.032767][ T3084] loop5: detected capacity change from 0 to 264192 [ 113.052301][ C0] sd 0:0:1:0: tag#3790 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 113.062181][ C0] sd 0:0:1:0: tag#3790 CDB: opcode=0xe5 (vendor) [ 113.068542][ C0] sd 0:0:1:0: tag#3790 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 113.077670][ C0] sd 0:0:1:0: tag#3790 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 113.086792][ C0] sd 0:0:1:0: tag#3790 CDB[20]: ba 07:44:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 07:44:05 executing program 3: futex(0x0, 0x8, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x6, 0x0, 0x0, 0x0, 0x0) 07:44:05 executing program 1: timer_create(0x7, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}}, &(0x7f0000000140)) 07:44:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd5, 0xd5, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xf3}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x0, &(0x7f00000001c0)) 07:44:05 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:05 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fchmod(r0, 0x0) 07:44:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) dup2(r0, r1) futex(0x0, 0x8, 0x0, 0x0, 0x0, 0x0) 07:44:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:05 executing program 1: socket(0x3, 0x0, 0x7fff) 07:44:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') 07:44:05 executing program 3: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x3, @thr={0x0, 0x0}}, 0x0) [ 113.699418][ T3092] loop4: detected capacity change from 0 to 4 [ 113.705889][ T3094] loop5: detected capacity change from 0 to 264192 [ 113.722942][ T3092] EXT4-fs (loop4): couldn't mount RDWR because of unsupported optional features (8e040000) [ 113.780627][ C0] sd 0:0:1:0: tag#3795 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 113.783808][ T24] audit: type=1400 audit(1641109445.752:167): avc: denied { read } for pid=3102 comm="syz-executor.0" name="event0" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 113.790497][ C0] sd 0:0:1:0: tag#3795 CDB: opcode=0xe5 (vendor) [ 113.790517][ C0] sd 0:0:1:0: tag#3795 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 113.821378][ T24] audit: type=1400 audit(1641109445.792:168): avc: denied { open } for pid=3102 comm="syz-executor.0" path="/dev/input/event0" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 113.829204][ C0] sd 0:0:1:0: tag#3795 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 113.829225][ C0] sd 0:0:1:0: tag#3795 CDB[20]: ba 07:44:05 executing program 3: pselect6(0x40, &(0x7f0000001400), 0x0, 0x0, 0x0, 0x0) 07:44:05 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x220800, 0x0) 07:44:05 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') ftruncate(0xffffffffffffffff, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(0xffffffffffffffff, r3, 0x0, 0x8400fffffffa) 07:44:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, 0x0) 07:44:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000080)) 07:44:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001300011d08", @ANYRES32=0x0, @ANYBLOB="000000000000000004"], 0x24}}, 0x0) [ 113.874431][ T24] audit: type=1400 audit(1641109445.842:169): avc: denied { create } for pid=3105 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 113.894247][ T24] audit: type=1400 audit(1641109445.842:170): avc: denied { module_request } for pid=3105 comm="syz-executor.1" kmod="net-pf-3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 07:44:05 executing program 1: ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) clock_gettime(0x6, &(0x7f0000000080)) 07:44:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 113.952123][ T3125] loop4: detected capacity change from 0 to 4 [ 113.958759][ T3127] loop5: detected capacity change from 0 to 264192 [ 113.966512][ T3129] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 07:44:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000004c0), 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) [ 113.996946][ C1] sd 0:0:1:0: tag#3796 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 114.006810][ C1] sd 0:0:1:0: tag#3796 CDB: opcode=0xe5 (vendor) [ 114.010997][ T24] audit: type=1400 audit(1641109445.982:171): avc: denied { read } for pid=3135 comm="syz-executor.0" name="usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 114.013347][ C1] sd 0:0:1:0: tag#3796 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 114.036969][ T24] audit: type=1400 audit(1641109445.982:172): avc: denied { open } for pid=3135 comm="syz-executor.0" path="/dev/usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 114.045970][ C1] sd 0:0:1:0: tag#3796 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 07:44:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000001580)={&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000014c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001540)=[@rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x18}, 0x0) [ 114.069944][ T24] audit: type=1400 audit(1641109445.982:173): avc: denied { ioctl } for pid=3135 comm="syz-executor.0" path="/dev/usbmon0" dev="devtmpfs" ino=117 ioctlcmd=0x9425 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 114.078920][ C1] sd 0:0:1:0: tag#3796 CDB[20]: ba 07:44:06 executing program 3: socket(0x11, 0x2, 0xe0) 07:44:06 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/icmp\x00') read$usbmon(r0, &(0x7f0000000140)=""/253, 0xfd) 07:44:06 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x81, 0x0) 07:44:06 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') ftruncate(0xffffffffffffffff, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(0xffffffffffffffff, r3, 0x0, 0x8400fffffffa) 07:44:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, 0x0) 07:44:06 executing program 1: clock_gettime(0xfd977c2e3a93bf06, 0x0) 07:44:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000000013000100000000000000006e66"], 0x24}}, 0x0) 07:44:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=@can_delroute={0x14, 0x19, 0x34bd86acdcdaef6d}, 0x14}}, 0x0) 07:44:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="200000000002000019000000600100000f00000000000000000000000400000000fb01000020000020000000ddf4655fddf4655f0100ffff53ef01fd4a000000ddf4655f000000000000000001000000000000000b0100000001000008000000d24200001203058ee0f60becafc44a9c60a1fa05009cdc24a52745cb4d4d3a992e769c8dbbbcc01c82eb3b540792440785b1221ad15c30b311d9067402cc71babfec4b5858955dcae4f86c52eceaba344cc6b25e8862d902000000105c6f83a0a463184734d949e3fc52d08b689c0943", 0xd0, 0x400}], 0x81, 0x0) 07:44:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001200)=ANY=[@ANYBLOB="1c"], 0x40}, 0x0) [ 114.756707][ T3153] loop4: detected capacity change from 0 to 4 [ 114.764881][ T3154] loop5: detected capacity change from 0 to 264192 [ 114.771425][ T24] audit: type=1400 audit(1641109446.742:174): avc: denied { write } for pid=3144 comm="syz-executor.1" name="nvram" dev="devtmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 07:44:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') fcntl$notify(r0, 0x402, 0x0) 07:44:06 executing program 0: clock_gettime(0x6589f4b9ae8213ff, 0x0) 07:44:06 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') ftruncate(0xffffffffffffffff, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(0xffffffffffffffff, r3, 0x0, 0x8400fffffffa) 07:44:06 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0xde18c) 07:44:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:06 executing program 3: socket(0x0, 0xe, 0x0) 07:44:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:44:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000001280)=@delneigh={0x2c, 0x1d, 0x1, 0x0, 0x0, {0xa}, [@NDA_LINK_NETNSID={0x8}, @NDA_LINK_NETNSID={0x8}]}, 0x2c}}, 0x0) 07:44:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@setlink={0x3c, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_vlan\x00'}, @IFLA_MTU={0x8, 0x4, 0x7b14}]}, 0x3c}}, 0x0) 07:44:06 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x107380, 0x0) [ 114.910943][ T3180] loop5: detected capacity change from 0 to 264192 [ 114.925018][ T3186] loop4: detected capacity change from 0 to 4 07:44:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg2\x00'}) 07:44:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:06 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:06 executing program 0: syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_trie\x00') 07:44:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000040)=""/4, 0x4) 07:44:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001840)='wchan\x00') preadv2(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/100, 0x64}], 0x1, 0x2, 0x0, 0x0) 07:44:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) [ 115.005275][ T3198] loop5: detected capacity change from 0 to 264192 07:44:07 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none, 0x4, 0x2}, 0xe) 07:44:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') 07:44:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:07 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x220000, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, 0x0, 0x0) 07:44:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @ethernet={0x0, @remote}, @phonet, @l2={0x1f, 0x0, @fixed}}) [ 115.779545][ T24] audit: type=1400 audit(1641109447.752:175): avc: denied { create } for pid=3215 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 07:44:07 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000000130001"], 0x24}}, 0x0) 07:44:07 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040), 0x4) 07:44:07 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') 07:44:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) read(r0, &(0x7f0000000900)=""/236, 0xec) 07:44:07 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/kcm\x00') 07:44:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 115.823276][ T24] audit: type=1400 audit(1641109447.782:176): avc: denied { connect } for pid=3215 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 115.854775][ T3223] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 07:44:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="2400000013000100"/20, @ANYRES32=0x0, @ANYBLOB="00b9db4384f4fd89b6"], 0x24}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 07:44:07 executing program 3: wait4(0x0, 0x0, 0x338ab14dab1c9ea3, 0x0) 07:44:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 07:44:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180), 0xffffffffffffffff) [ 115.941009][ T3238] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 116.008422][ T3247] loop5: detected capacity change from 0 to 264192 [ 116.020601][ C1] scsi_io_completion_action: 3 callbacks suppressed [ 116.020650][ C1] sd 0:0:1:0: tag#3800 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 116.037069][ C1] sd 0:0:1:0: tag#3800 CDB: opcode=0xe5 (vendor) [ 116.043416][ C1] sd 0:0:1:0: tag#3800 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 116.052439][ C1] sd 0:0:1:0: tag#3800 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 116.061446][ C1] sd 0:0:1:0: tag#3800 CDB[20]: ba 07:44:08 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:08 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000004200)='ns/pid_for_children\x00') 07:44:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@setlink={0x3c, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x200}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_vlan\x00'}, @IFLA_MTU={0x8, 0x4, 0x7b14}]}, 0x3c}}, 0x0) 07:44:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:08 executing program 0: pselect6(0x40, &(0x7f0000001400), &(0x7f0000001440)={0x7ff}, 0x0, 0x0, 0x0) 07:44:08 executing program 1: r0 = socket(0x18, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) 07:44:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001400)={&(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000013c0)=[@hoplimit_2292={{0x14, 0x29, 0x2}}], 0x18}, 0x0) 07:44:08 executing program 0: pselect6(0x0, 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001540)={0x0}) 07:44:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:08 executing program 1: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x4002) 07:44:08 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, 0x0) 07:44:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 117.011824][ T3274] loop5: detected capacity change from 0 to 264192 [ 117.022969][ C1] sd 0:0:1:0: tag#3801 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 117.032817][ C1] sd 0:0:1:0: tag#3801 CDB: opcode=0xe5 (vendor) [ 117.039154][ C1] sd 0:0:1:0: tag#3801 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 117.048309][ C1] sd 0:0:1:0: tag#3801 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 117.057337][ C1] sd 0:0:1:0: tag#3801 CDB[20]: ba [ 117.077041][ T3257] syz-executor.3 (3257) used greatest stack depth: 10992 bytes left 07:44:09 executing program 5: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r0, r3, 0x0, 0x8400fffffffa) 07:44:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000160001"], 0x14}}, 0x0) 07:44:09 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) read(r0, &(0x7f00000002c0)=""/38, 0x26) 07:44:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:09 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) 07:44:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/raw\x00') read$usbmon(r0, 0x0, 0x0) 07:44:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 07:44:09 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x18, 0xfffffffffffffffe) 07:44:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000001840)='wchan\x00') preadv2(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/100, 0x64}], 0x1, 0x0, 0x0, 0x0) 07:44:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:09 executing program 3: capget(&(0x7f0000001580)={0x19980330}, 0x0) 07:44:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NUM_TX_QUEUES={0xfffffffffffffe3b}, @IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x4}]}, @IFLA_GSO_MAX_SEGS={0x8}]}, 0x38}}, 0x0) [ 117.920428][ T3296] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) [ 117.932398][ T3298] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 117.990304][ C1] sd 0:0:1:0: tag#3802 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 118.000126][ C1] sd 0:0:1:0: tag#3802 CDB: opcode=0xe5 (vendor) [ 118.006436][ C1] sd 0:0:1:0: tag#3802 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 118.015442][ C1] sd 0:0:1:0: tag#3802 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 118.024460][ C1] sd 0:0:1:0: tag#3802 CDB[20]: ba 07:44:10 executing program 5: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r0, r3, 0x0, 0x8400fffffffa) 07:44:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1600bd7f, 0x0, 0x7) 07:44:10 executing program 3: r0 = socket(0x2, 0x3, 0xbf) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8971, &(0x7f0000000b00)={'sit0\x00', 0x0}) 07:44:10 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 07:44:10 executing program 1: r0 = socket(0x2, 0x3, 0xbf) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 07:44:10 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 07:44:10 executing program 3: io_setup(0x4c5, &(0x7f0000000180)=0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000001840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x7}]) 07:44:10 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r0, 0x5411, 0x0) 07:44:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000098c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@dstopts_2292={{0x18}}, @hoplimit={{0x14, 0x29, 0x34, 0xb72}}], 0x30}}], 0x1, 0x0) 07:44:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:10 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000026c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 118.937890][ C1] sd 0:0:1:0: tag#3836 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 118.947773][ C1] sd 0:0:1:0: tag#3836 CDB: opcode=0xe5 (vendor) [ 118.954081][ C1] sd 0:0:1:0: tag#3836 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 118.963094][ C1] sd 0:0:1:0: tag#3836 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 118.972118][ C1] sd 0:0:1:0: tag#3836 CDB[20]: ba 07:44:11 executing program 5: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r0, r3, 0x0, 0x8400fffffffa) 07:44:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) 07:44:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003580)=[{{&(0x7f0000000400)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@dstopts={{0x18}}, @dstopts={{0x18}}], 0x30}}, {{&(0x7f0000000700)={0xa, 0x4e21, 0x0, @mcast1, 0xc2ae}, 0x1c, 0x0}}], 0x2, 0x0) 07:44:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:11 executing program 3: sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x890b, &(0x7f0000000000)={'syztnl0\x00', 0x0}) 07:44:11 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) pselect6(0x40, &(0x7f0000000080), &(0x7f0000000300)={0x9}, 0x0, 0x0, 0x0) 07:44:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8943, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 07:44:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f0000000000)) 07:44:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private1={0xfc, 0x1, '\x00', 0x1}}}) 07:44:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x58}}, 0x0) 07:44:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001280)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@pktinfo={{0x24, 0x29, 0x3b, {@private0}}}], 0x28}}], 0x1, 0x0) [ 119.869372][ T3350] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 119.914832][ C1] sd 0:0:1:0: tag#3837 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 119.924658][ C1] sd 0:0:1:0: tag#3837 CDB: opcode=0xe5 (vendor) [ 119.930985][ C1] sd 0:0:1:0: tag#3837 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 119.940014][ C1] sd 0:0:1:0: tag#3837 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 119.949035][ C1] sd 0:0:1:0: tag#3837 CDB[20]: ba 07:44:12 executing program 5: r0 = syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:12 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000b40004"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:44:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:12 executing program 4: accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000180)=0x2, 0x4) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:44:12 executing program 0: sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x890b, &(0x7f0000000000)={'syztnl0\x00', 0x0}) 07:44:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002180)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)="e27d233d26547292dcec8de8fd", 0xd}], 0x1}}], 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x890b, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 07:44:12 executing program 4: io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) 07:44:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001280)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="24000000000000002900000032000000fc00"/29, @ANYRES32], 0x28}}], 0x1, 0x0) 07:44:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x3, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @typedef, @fwd, @func_proto, @restrict, @const, @volatile]}, {0x0, [0x0]}}, 0x0, 0xbb}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @loopback}}) 07:44:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001280)=[{{&(0x7f0000000080)={0x2, 0x4e20, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x4000000) [ 120.760240][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 120.760251][ T24] audit: type=1400 audit(1641109452.732:180): avc: denied { prog_load } for pid=3353 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 120.870741][ T3377] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 120.884467][ T3379] loop5: detected capacity change from 0 to 264192 [ 120.901155][ C1] sd 0:0:1:0: tag#3838 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 120.911007][ C1] sd 0:0:1:0: tag#3838 CDB: opcode=0xe5 (vendor) [ 120.917353][ C1] sd 0:0:1:0: tag#3838 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 120.926374][ C1] sd 0:0:1:0: tag#3838 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 120.935502][ C1] sd 0:0:1:0: tag#3838 CDB[20]: ba 07:44:13 executing program 5: r0 = syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x360, 0xffffffff, 0x0, 0x200, 0xe8, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @mcast2, [], [], 'xfrm0\x00', 'veth0_to_bond\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "fe4eb0973bd6aeae676745f83905977a445f218b4cbfede5b12931def73e"}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@loopback, @mcast1, [], [], 'macsec0\x00', 'netpci0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 07:44:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:13 executing program 3: io_setup(0x0, &(0x7f0000000180)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x8902, &(0x7f0000000140)) 07:44:13 executing program 4: r0 = socket(0x2, 0x3, 0xbf) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8924, &(0x7f0000000b00)={'sit0\x00', 0x0}) 07:44:13 executing program 0: syz_io_uring_setup(0x77b9, &(0x7f0000000340), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0), &(0x7f00000003c0)) 07:44:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:13 executing program 1: r0 = socket(0x2, 0x3, 0xbf) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8937, &(0x7f0000000b00)={'sit0\x00', 0x0}) 07:44:13 executing program 0: r0 = socket(0x2, 0x3, 0xbf) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8927, &(0x7f0000000b00)={'sit0\x00', 0x0}) 07:44:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe9, 0xe9, 0x4, [@const, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @typedef, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @const, @volatile]}, {0x0, [0x0, 0x0]}}, 0x0, 0x108}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1600bd74, 0x0, 0x7) [ 121.796007][ T24] audit: type=1400 audit(1641109453.762:181): avc: denied { map } for pid=3384 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=20998 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 121.820753][ T24] audit: type=1400 audit(1641109453.762:182): avc: denied { read write } for pid=3384 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=20998 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 121.984685][ T3407] loop5: detected capacity change from 0 to 264192 [ 121.993162][ C0] sd 0:0:1:0: tag#3839 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 122.003012][ C0] sd 0:0:1:0: tag#3839 CDB: opcode=0xe5 (vendor) [ 122.009396][ C0] sd 0:0:1:0: tag#3839 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 122.018443][ C0] sd 0:0:1:0: tag#3839 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 122.027451][ C0] sd 0:0:1:0: tag#3839 CDB[20]: ba 07:44:14 executing program 1: io_setup(0x4c5, &(0x7f0000000180)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:44:14 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000004c80)=[{{&(0x7f00000001c0)=@in={0x2, 0x4e24, @local}, 0x80, 0x0, 0x0, &(0x7f0000000400)=[@txtime={{0x18}}], 0x18}}], 0x1, 0x0) 07:44:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004f00)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c, 0x0}}, {{&(0x7f0000000680)={0xa, 0x4e23, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="140000000000000029000000080000000000000001c012940046"], 0x30}}], 0x2, 0x0) 07:44:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:14 executing program 5: r0 = syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000004c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}}], 0x1, 0x10) 07:44:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 07:44:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) getsockname$inet6(r0, 0x0, 0x0) 07:44:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 07:44:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x0, 0xec59, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 122.948597][ T24] audit: type=1400 audit(1641109454.922:183): avc: denied { bind } for pid=3425 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 122.968425][ T24] audit: type=1400 audit(1641109454.922:184): avc: denied { name_bind } for pid=3425 comm="syz-executor.0" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 07:44:14 executing program 4: socketpair(0x2, 0x3, 0x0, &(0x7f0000000040)) 07:44:14 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 07:44:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x12, 0x0, 0x7) 07:44:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x0, 0x0, 0x66}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:15 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmmsg(r0, &(0x7f0000005040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 122.989591][ T24] audit: type=1400 audit(1641109454.922:185): avc: denied { node_bind } for pid=3425 comm="syz-executor.0" saddr=::ffff:0.0.0.0 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 123.029466][ T3434] loop5: detected capacity change from 0 to 264192 07:44:15 executing program 3: r0 = socket(0xa, 0x3, 0x7) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0xf0c}, 0x1c) [ 123.045845][ C1] sd 0:0:1:0: tag#3776 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 123.055789][ C1] sd 0:0:1:0: tag#3776 CDB: opcode=0xe5 (vendor) [ 123.062144][ C1] sd 0:0:1:0: tag#3776 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 123.071525][ C1] sd 0:0:1:0: tag#3776 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 123.080597][ C1] sd 0:0:1:0: tag#3776 CDB[20]: ba 07:44:15 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x4d, 0x0, &(0x7f0000000040)) 07:44:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newrule={0x1c, 0x20, 0x1}, 0x1c}}, 0x0) 07:44:15 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0xcc201, 0x0) 07:44:15 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, 0x0}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x890b, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) 07:44:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x35, 0x0, &(0x7f0000000040)) 07:44:15 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x20001) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) 07:44:15 executing program 0: io_setup(0x4c5, &(0x7f0000000180)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) 07:44:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:15 executing program 3: r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create(0x980) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) 07:44:15 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002740)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) [ 124.110865][ T3470] loop5: detected capacity change from 0 to 264192 [ 124.121508][ C0] sd 0:0:1:0: tag#3781 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 124.131353][ C0] sd 0:0:1:0: tag#3781 CDB: opcode=0xe5 (vendor) [ 124.137707][ C0] sd 0:0:1:0: tag#3781 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 124.146735][ C0] sd 0:0:1:0: tag#3781 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 124.155753][ C0] sd 0:0:1:0: tag#3781 CDB[20]: ba 07:44:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:16 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101, 0x0) 07:44:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, 0x0) 07:44:16 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x440, 0x0) 07:44:16 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, 0x0) 07:44:16 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLOPEN(r0, 0x0, 0x0) 07:44:16 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 07:44:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000002280)) 07:44:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 07:44:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:17 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, 0x0, 0x0) 07:44:17 executing program 3: readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/152, 0x98) 07:44:17 executing program 4: io_setup(0x4c5, &(0x7f0000000180)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0), 0x8}) [ 125.082420][ T3500] loop5: detected capacity change from 0 to 264192 [ 125.091899][ C1] sd 0:0:1:0: tag#3782 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 125.101754][ C1] sd 0:0:1:0: tag#3782 CDB: opcode=0xe5 (vendor) [ 125.108105][ C1] sd 0:0:1:0: tag#3782 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 125.117123][ C1] sd 0:0:1:0: tag#3782 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 125.126147][ C1] sd 0:0:1:0: tag#3782 CDB[20]: ba 07:44:17 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{0x0, 0x3, 0x4}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:17 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWALK(r0, 0x0, 0x0) 07:44:17 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_linger(r0, 0x1, 0xd, 0x0, 0x0) 07:44:17 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 07:44:17 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) 07:44:17 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) 07:44:17 executing program 0: pipe2(&(0x7f0000000280), 0x0) socket$nl_generic(0x10, 0x3, 0x10) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x9}, 0x0, 0x0) 07:44:17 executing program 1: syz_emit_ethernet(0xfa, &(0x7f0000000380)={@multicast, @empty, @void, {@ipv4={0x800, @gre={{0x2a, 0x4, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @remote, {[@cipso={0x86, 0x28, 0x0, [{0x0, 0x10, "a5bf2ea600b59de9933f0c3d2d41"}, {0x0, 0x2}, {0x0, 0x10, "df296d20c373c160b54081885cef"}]}, @cipso={0x86, 0x5a, 0x0, [{0x0, 0x10, "39b237cbd166e966f4b095464099"}, {0x0, 0x6, "742b7301"}, {0x0, 0x6, "2c1946d1"}, {0x0, 0x7, "60012f3f59"}, {0x0, 0x11, "82c6ad352e7654aa223c8602038b13"}, {0x0, 0xe, "816d71e3aba7bf7d08388e04"}, {0x0, 0x10, "09367d3e7fa3e74198ed4bfcbee3"}, {0x0, 0x2}]}, @ra={0x94, 0x4}, @ssrr={0x89, 0xb, 0x0, [@dev, @loopback]}]}}}}}}, 0x0) 07:44:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{0x0, 0x0, 0x4}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:17 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x4bfa, 0x0) 07:44:17 executing program 1: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x4800, 0xfffffffffffffffb) [ 126.049143][ T3526] loop5: detected capacity change from 0 to 264192 [ 126.057309][ C0] sd 0:0:1:0: tag#3783 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 126.067177][ C0] sd 0:0:1:0: tag#3783 CDB: opcode=0xe5 (vendor) [ 126.073624][ C0] sd 0:0:1:0: tag#3783 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 126.082739][ C0] sd 0:0:1:0: tag#3783 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 126.091758][ C0] sd 0:0:1:0: tag#3783 CDB[20]: ba 07:44:18 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:18 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x4b47, 0x0) 07:44:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:18 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x4b72, 0x0) 07:44:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x11, 0x0, 0x0) 07:44:18 executing program 3: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000000240)) fsmount(0xffffffffffffffff, 0x0, 0x0) 07:44:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000140)={'sit0\x00', 0x0}) 07:44:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000800)=0x8, 0x4) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 07:44:18 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@multicast, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @broadcast, @private=0xe0000000}, @redirect={0x5, 0x0, 0x0, @private, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private}}}}}}, 0x0) 07:44:18 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000002c0)={&(0x7f0000000280)={[0xffff]}, 0x8}) 07:44:18 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xd811, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000180)=0x80000000) 07:44:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 127.013253][ T3552] FAT-fs (loop5): bogus number of reserved sectors [ 127.019828][ T3552] FAT-fs (loop5): Can't find a valid FAT filesystem [ 127.079679][ C1] sd 0:0:1:0: tag#3784 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 127.089518][ C1] sd 0:0:1:0: tag#3784 CDB: opcode=0xe5 (vendor) [ 127.095823][ C1] sd 0:0:1:0: tag#3784 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 127.104917][ C1] sd 0:0:1:0: tag#3784 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 127.113933][ C1] sd 0:0:1:0: tag#3784 CDB[20]: ba 07:44:19 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') read$usbfs(r0, &(0x7f0000000180)=""/66, 0x42) 07:44:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000000c0)={@multicast1, @rand_addr, r2}, 0xc) 07:44:19 executing program 0: pipe2(&(0x7f0000000080), 0x0) pipe2(&(0x7f0000000080), 0x0) pipe2(&(0x7f0000000240), 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000080), 0x0) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x7fff}, &(0x7f0000000180), 0x0) 07:44:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000a40)="c5fcd303509da011df2003dae18642", 0xf}, {&(0x7f0000000a80)='c', 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, {{&(0x7f00000011c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="007c591f7bd2"}, 0x80, 0x0}}], 0x2, 0x0) 07:44:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x123}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:19 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 07:44:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000003a00)=0x1d, 0x4) 07:44:19 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/timer_list\x00', 0x300, 0x0) [ 127.864802][ T3560] Zero length message leads to an empty skb 07:44:19 executing program 4: syz_open_procfs(0x0, &(0x7f0000000380)='totmaps\x00') 07:44:19 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000640)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x2800880, &(0x7f00000000c0)=ANY=[]) r2 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop0', 0x501801, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000280)="77690addcfbe1fbb", 0x8}], 0x1, 0x6) sendmsg$IPCTNL_MSG_EXP_NEW(r3, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={0x0, 0x48}}, 0x804) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8801}, 0x40860) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0), r2) sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x98, r4, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xade}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x401}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1400}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x36}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4040}, 0x8880) [ 127.922203][ T24] audit: type=1400 audit(1641109459.892:186): avc: denied { setopt } for pid=3568 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 127.953795][ T3575] loop1: detected capacity change from 0 to 4096 [ 127.963848][ T24] audit: type=1400 audit(1641109459.922:187): avc: denied { read } for pid=3574 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 128.000426][ T3575] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 128.015315][ T3580] FAT-fs (loop5): bogus number of reserved sectors [ 128.015580][ T24] audit: type=1400 audit(1641109459.992:188): avc: denied { mount } for pid=3574 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 128.021895][ T3580] FAT-fs (loop5): Can't find a valid FAT filesystem [ 128.043762][ T24] audit: type=1400 audit(1641109459.992:189): avc: denied { write } for pid=3574 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 128.072279][ T24] audit: type=1400 audit(1641109459.992:190): avc: denied { add_name } for pid=3574 comm="syz-executor.1" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 128.093352][ T24] audit: type=1400 audit(1641109459.992:191): avc: denied { create } for pid=3574 comm="syz-executor.1" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 128.113967][ T24] audit: type=1400 audit(1641109460.032:192): avc: denied { append } for pid=1420 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 128.136554][ T24] audit: type=1400 audit(1641109460.032:193): avc: denied { open } for pid=1420 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 128.142497][ C0] sd 0:0:1:0: tag#3785 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 128.159237][ T24] audit: type=1400 audit(1641109460.032:194): avc: denied { getattr } for pid=1420 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 128.169062][ C0] sd 0:0:1:0: tag#3785 CDB: opcode=0xe5 (vendor) [ 128.191743][ T24] audit: type=1400 audit(1641109460.032:195): avc: denied { write open } for pid=3574 comm="syz-executor.1" path="/root/syzkaller-testdir498779615/syzkaller.dfGZFN/150/file0/file1" dev="loop1" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 128.198062][ C0] sd 0:0:1:0: tag#3785 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 128.198081][ C0] sd 0:0:1:0: tag#3785 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 128.243816][ C0] sd 0:0:1:0: tag#3785 CDB[20]: ba 07:44:20 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:20 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$cgroup_pid(r0, 0x0, 0x0) 07:44:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000a40)="c5fcd303509da011df2003dae1864253", 0x10}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, {{&(0x7f00000011c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="007c591f7bd2"}, 0x80, &(0x7f0000001480)=[{&(0x7f0000001240)='g', 0x1}], 0x1}}], 0x2, 0x0) 07:44:20 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) select(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x9}, 0x0) 07:44:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc6, 0xc6, 0x3, [@int, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xe3}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:20 executing program 1: ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}], 0x1000000, &(0x7f00000000c0)=ANY=[]) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x800, 0x20, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee01, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) r3 = dup3(r2, r0, 0x0) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f00000002c0)=""/135) open(0x0, 0x0, 0x0) 07:44:20 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0) 07:44:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc6, 0xc6, 0x3, [@int, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xe3}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x4b4) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="ad858dba625631d4217773992af546a7722ae99ad1635754649fd88aa842b82fba40d755fa5f2892ccecb2aac414e72620e860fa4a575bc5a4b1009b56c1bd766b76abb800"/80], 0x24}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "fa5fd64c5b96a0d377ebf13855728a8dac1166f21eff9d52bdd47e8237d9f6e31186d78819be344b527b36812eec2137fd5e17a042f9ade71588ee783b2fc2ad", 0x33}, 0x48, 0xfffffffffffffffb) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='$%&)\\{:&\x00', r1) [ 128.865933][ T3590] loop1: detected capacity change from 0 to 4096 07:44:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc6, 0xc6, 0x3, [@int, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xe3}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 128.905949][ T3590] EXT4-fs error (device loop1): ext4_quota_enable:6323: comm syz-executor.1: Bad quota inode # 3 [ 128.916759][ T3590] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 128.931309][ T3590] EXT4-fs (loop1): mount failed 07:44:20 executing program 1: socketpair(0x10, 0x2, 0xfffffff7, &(0x7f0000000000)) [ 128.956671][ T3595] debugfs: File 'dropped' in directory 'loop6' already present! [ 128.985767][ T3595] debugfs: File 'msg' in directory 'loop6' already present! [ 129.055567][ T3614] FAT-fs (loop5): bogus number of reserved sectors [ 129.062127][ T3614] FAT-fs (loop5): Can't find a valid FAT filesystem [ 129.139606][ C1] sd 0:0:1:0: tag#3790 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 129.149467][ C1] sd 0:0:1:0: tag#3790 CDB: opcode=0xe5 (vendor) [ 129.155789][ C1] sd 0:0:1:0: tag#3790 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 129.164826][ C1] sd 0:0:1:0: tag#3790 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 129.173853][ C1] sd 0:0:1:0: tag#3790 CDB[20]: ba 07:44:21 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000080)=@unspec, 0xc) 07:44:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x4b4) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="ad858dba625631d4217773992af546a7722ae99ad1635754649fd88aa842b82fba40d755fa5f2892ccecb2aac414e72620e860fa4a575bc5a4b1009b56c1bd766b76abb800"/80], 0x24}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "fa5fd64c5b96a0d377ebf13855728a8dac1166f21eff9d52bdd47e8237d9f6e31186d78819be344b527b36812eec2137fd5e17a042f9ade71588ee783b2fc2ad", 0x33}, 0x48, 0xfffffffffffffffb) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='$%&)\\{:&\x00', r1) 07:44:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0) 07:44:21 executing program 4: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, 0x0, &(0x7f00000001c0)={0x0, r0/1000+60000}) 07:44:21 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000003c0), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 07:44:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:21 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000001c0)) 07:44:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x4b4) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="ad858dba625631d4217773992af546a7722ae99ad1635754649fd88aa842b82fba40d755fa5f2892ccecb2aac414e72620e860fa4a575bc5a4b1009b56c1bd766b76abb800"/80], 0x24}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "fa5fd64c5b96a0d377ebf13855728a8dac1166f21eff9d52bdd47e8237d9f6e31186d78819be344b527b36812eec2137fd5e17a042f9ade71588ee783b2fc2ad", 0x33}, 0x48, 0xfffffffffffffffb) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='$%&)\\{:&\x00', r1) 07:44:21 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) 07:44:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001900)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, 0x0}, 0x0) [ 129.927822][ T3623] debugfs: File 'dropped' in directory 'loop6' already present! [ 129.976303][ T3623] debugfs: File 'msg' in directory 'loop6' already present! [ 130.024833][ C1] sd 0:0:1:0: tag#3791 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 130.034704][ C1] sd 0:0:1:0: tag#3791 CDB: opcode=0xe5 (vendor) [ 130.041063][ C1] sd 0:0:1:0: tag#3791 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 130.050086][ C1] sd 0:0:1:0: tag#3791 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 130.059095][ C1] sd 0:0:1:0: tag#3791 CDB[20]: ba [ 130.068646][ T3634] debugfs: File 'dropped' in directory 'loop6' already present! [ 130.076344][ T3634] debugfs: File 'msg' in directory 'loop6' already present! 07:44:22 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:22 executing program 1: socketpair(0x0, 0xff2fb870ffeea8b9, 0x0, 0x0) 07:44:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:22 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0) 07:44:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x4b4) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="ad858dba625631d4217773992af546a7722ae99ad1635754649fd88aa842b82fba40d755fa5f2892ccecb2aac414e72620e860fa4a575bc5a4b1009b56c1bd766b76abb800"/80], 0x24}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "fa5fd64c5b96a0d377ebf13855728a8dac1166f21eff9d52bdd47e8237d9f6e31186d78819be344b527b36812eec2137fd5e17a042f9ade71588ee783b2fc2ad", 0x33}, 0x48, 0xfffffffffffffffb) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='$%&)\\{:&\x00', r1) 07:44:22 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) 07:44:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:22 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) select(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x9}, &(0x7f0000000100)) 07:44:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:22 executing program 3: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000340)={0x0, 0x0, "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", "0e821a6af1ee52437cf6f1c0cac3bab84485db48745ea21e7a35d7c9359c4f2d8cad8b072e6ecca5e10100839db8af660f47ac5bb71a235321515aea461213e705adaca49cede7bc2b2d436e9585e3e4d8be6f1e1fe20cdbefad34651cb65539fa5e360dcee60d02076f89856caf2f53443245f4778686244178c1e38cfa3f617a2bd09e80abab2d5b19310d0422aeeba1936808940fa7ea1c07d28a395942fcf4b510bcaa0f91751fe781a4c06813e1485726dd8ba57eadccf9b01b443d238f3a74606eaf06b5658f989336a996c107cc4086bcca11f8adb8f7479eb5c46b281a73813ca77294ad7cbab53b08e1741e6db58d0bd72b2815e35e78272fb84841b206c5879fc2d8d601efc65cf484b5f3dceb61407f448afa702925908f61fabe481dee6865fc7a64a703b6fa656746658db5a7bd66fc8c1b8867394c1f8cf9f1c6ebd843a6a718290425d10a310b04842ac67aad4b3fff40e930bda748a361392153d8ac6af32d653d67dc9812605a03def4441533581084444aacf35688d031dd622736886219e1bae87f8c4b03072a36bf1913a0006ea0ab4e5b096e72214aeee4e47cecae4ba3867b01aac74f8a9252e2e6ffe6701804d35cedc1c1205c8a4179eaee910f4bdf8ba1bc3018e9319980fe08d0cfd62a29c84ca8c7daa8afac4717ee2acd3b2a885e068efceee026f5ee1d96e98805c2b4883b3400e439a54a1b5184d728df3053cd10e81ce96d99b7e1e3f2c3f20ca8ca4bffaccb4f5de60d61642054dbfb132e9c7dbbe21f17559f97e27c26c0c1181d07229311b4788ee8db6e686eba2f52e88887bbdb54fb34de2d0f77cc90e0852e1729dee1a910db130745316c9b9d837b36daf0876a035ca5befc9c4c0b0c12a79b15301134628de7b069fc7384fffdf18644cd49ac06efdf7989bedf51acb63b3314d2c59e5eea0cd8e364b60088bc9acdefbcf08f5157f9095d03045ff9893b51bbe01e601d8885f089efb4e5f47320735de25970f074a1bd876e617418348c574d84482a574aacc4509d897b7a038542fa59adea8893503faf20823a742547903091c85630dc1aaaffd940f8197be19c09dff469f81beda2422f0f7ca78cfc4d7d2c2c5a0cfdd32c4251a1c9a7723862de3656621065b34ee720eb66d4a8cc25e41b71a68b3f6f13181e2499556f94d7bd5d9cf22996fb9d68793f9ae244354701aeeb949c3ce7e5f296178e69b6861ddd85d2655e03b8fe6885b0b02597f3a55b6b80e865c1a4c3ac6502498571baaa510f96797ac71b9c5727626f101b8659bf91edd6a5f7b5cb51cc658669d5ba60041f03d1a3e214d35391aff600c8a5ca8a970494f08a784de10a6df88c5fc7a22d53f37ebb20677a349f230cf678b86b205138e241225104e5bef7c48efaee75d6d9cf4c3182816cde643d89ea1bafd39e04c8200cd38235242b0d308617abc391da5918e1c22efd91fec0b1111d4f3d8acaa115c5835c678d30c11fc886189d09ad44158ba57dd134122077f3d13a850aa610fe12bcaccb3c12ed26905d07d2b4e10a51cd802e8ca902a6295b0af7d00bbd42d69774b24d2140a21fca361246301e97592d541ecad7b6892437330186caa9d4304c6c651c1fbd61acc3543471613e8b983e0559863fd326c462a278dc3e62c40f0763a28904c6e191c1f9a40d149be5e80a8324c4431e5d450c98ece33fe6c914acb6e95905bf2d4d797bff7fbb120207f0964975ea2e157a0a33fadcd33f88550ca2d1d076a723230ae7fefc3969fd3fd1219bdbc2c40fa37aca2d03479c782e363e5b65d09565c64584e89e8f8e93197706dcdf38288b06bac16866a4af3b76a166b2b8ed46e4b4253191ad1fe43b91896740e4d6eea5d95355dd652252d89c60376ace6ebd8d9b7b791435dfb891999262fc5bebbe4d614cd8ed38647c383a2de82b2d66eafbc0a43ca700b000273bf18516f57c31bc49acc7838f735d78a3560080601b798031967096e0bc200be495ffba4d3c0b2336558f79198dd2e416d7ad1871a5636c7b33f77a363adb55eda603000b034460c4d6f740a5bc002f8225f169175b5aadc7fc92b6ca68114c281764b552dfb56f52e46d215aeb3cfa67c99559f6dbed779aebc4de4bec6ab8031c273e29f8d817343e9040be8d263fa23686eceda7284b7979342a32224b6e1b114b11aef6808b658eeb4f7335942283a4f054bee9a6211765826495ba972ef69608e0e7571053da2ddd9cb2fe58c77cb3db6b26a2cdb334d341cab43ef29e091ee2a34832ac4678b72a4cb239a7d89d6c14982087f8efd379f89c7e12bd9419fd5ce6bc2c269c0cdef47931cb5116ecbe4eeda3253d5085d0c4658c3db7730449d3d2b5723cf17402d1f6a086cd1e1da141caf7602a32b4935c622efa9723b296063ac2744b8dc7862ac786f47cb1ec615950224ba6642bfae83e71c453595dd743bc41cee47ee4fafd1980733d4199947d81d40f406232a718de829976d4386d221b99c901b1da3c64a11dadb07ac066bfb143efda6ad82ee29e5559730e4a265b4b2f0b056e571165176918eb5f1ad1fba5176d24cd05e18d6b0a86379b1319ed653eedff202b4b5f5e38d442ec3a9868d9578f7b335ec22cd9d51cfb97999d4fb62eeab2712dfe00451151b621d4487a4774de98728cfd9fc8dc41ccc050a449f4d14912ffa994e15e402e4e333680af14d30311dac13e6fa1991606e3a054ff32c392ca16a3daae2a87de1653d33bb3a1417200d86ced1707d5581866b1809d9db6b5ad8c7e8d8094c7aa32d1519ac234a1ac6f0c32032d2b78861bb8a272784ecc5408f011f27d78b1ce3cf7af5e58a4d8bb4e16155590ddd6a07f21d6984fcabde03276b7c220316c547d8dace68594c1fd357de5d1b69adbf8039e20c366cab588509e41d06e885a5589f6333c9073a78ab8cc6aeac730807b6514777f864d84ccdc76b17202e85647809f65a873e4412c64990cf029ab4ba28c450962d791d12fa6b072ee03ea67fc5c9ece208a3c5e57362beb612933675cbfd232205a283ef469fd01774d13fe7064506440f808de776a2a642bf97719d75c45ca3e61976ce456eb079edb229ff2dd83977cbf25d59145ffeae5a462687a7c2072b5dffcd4edb9788f973ac9407d31b6d3c519be25afa581057629ffa7843f4ccead807f61c7487cea267d5ff6ca9d0876f1601c740aa48dc0d5570ab66841414183300d1615acc218e64b3164a4bf9dc31863462be812e60a14244e2c03783023b22148080d8afd0310993d8e58aaef00791489165cec7b99290ee04daeafe6cd77f8d1418c099dc6670348a3bdbcfea8f4005b5cc52f0f1dca518481cd1bb90c87c40cae42dd3fd670914659fc1c4cabc8131a81ab9a7fde558c5843da0aa6c5296bb94863c58d3d5179934c53bcdaa42dc5719562c26fdf8fe25899360c776a52a637f5dd989675c48a314c5bc497de3217b827e718b4ad3378b13e9b8a7620e632ee0f880372fdea2ab6b41f9b5168ecfd54da6c6045762f5f160a0d3e815a1dbaea0738ae4e16e7d5692ef6b876cc7ec2548272a20aba5ac71675fdad3d5c752323ae3f2048676e00dee8ccbc147cf425718017ee19af30ed218a7c0b701e60b51afcd97491748ba8ebf95fd5cacae6e7c3f57719bd00313b11c3a9104c6278c8e1dd1e4cfd6d17a2bfae89a55f44261bd08c8fa21ef35745dae823df9397f8bfbe3c8f3ce6d13efcbdd8ff5ac7a0921c8509e4bfc3108d0a6d3f5c9a3d101293c9a3d14adb4f4ddee7aeccd03ee2559c1343002f2f770581f90eb16733592b7b4a3e72d974e1e177399f1ad5721fdd37e7635a77a4869f6fd6d4d8a1cef9b5c4e9e8cd978aa3b11edfad9a3a5896aa23914546b4eed4261d921373f2cd71c2153c48446a61bdc3435e876f5ea2c2522599627262127a0f5eee418b3b83b42e162e38d95da9a8967c6709538045b91c9bf9b5f43e0a2e0cd1685965ec2fca5cf1fa5f3a907eb0e9f92e9ebb33de36371fdac9a15a79089d8b507039aca4774b65488a3ef303e47d9032dc61b1873dc2953ceb82ab0dd3c5215928efcae7e3743432e63951bb043e89aa7ea7c1a2abfb3eeba64e7646faf68d29c1512f7e7ac2da249294e1c3d4a9ca99c6e94c9ab7259ca9258f4de3055e2d2b955eb29eb6db26dd9f4d9ef6977b4d25b7cbb010285a86d80f6d81f73f3366f906bad4e2fae4e9e52a41994d1418e5c8d2f1254c970dd04595824d76e0300961bab840ff8202646bf50bd3f23f4eba69e6cf4d96fb3733aa9e0bb349f09f1bdd9494e6c8f5688a1a77fa08d7d70540aa4a062219b5cce63d16508e0bdd2148ba0394caa12bec0bab82b8673bf558c28588f4b7551cc8b0cb66bf7f06ae1000043bdc3d8dfbf022261277f07061de07b94629af79223a9fe7ba2c48ae5dac940630899e0efc61e6447b0cca137bd3a30a25e50447db08e6b549d45201ebf25f14278917df0361153ac41be0ead1a3e28789961bfa646185d09cab51e1f40fbb8e43d636ae137f0679c8718dbbfaa81edbb53bbef7c5d1acb36c426b914edc563648965f4708e819c2674b5353363bf13ff8608275751669f2c9ea04a9db1f8625256c2e365f2bd77316df5e9dc3be17b82e8bf723541f16a86c253a4bf7c047c91b4e03a7c17681721d787f952b68d8baf86a0606a52c50ed74ee9f8f7646db1583ebd41cce79b5cf0baedb31bcfb00f5543ded614c4f7e50f136a73c6213ebd5f97bc229173104f910d1203ccaf16e8873997fffe0218a8499758a6b7fc0cd484481ac64a73969d8c018d6f145d9139d5ab1ce582a975b9c38b917f81f4d3cfd6f1214cfa4cc0245efd95202eae520fed05a684e17233bdedc1e94e8875cf353c1353b9345c9aa100e90af365f854297eff55d7471a8bcf1fc737f61801c0146cb8022a16bfa0492ecbefd70d0d886d4dd09390b4347d3c011de924e4ac365b29028dffd38503bfc87aaadd853a5b94c0e7107e65bfbd4fc0364c363fbf1eaad17e12aadfe7bfcb5f50b1cd1c745e6ff94cb5e2b02484e91df9e6fbec89161df75cc4d00eb8f127a2e0d3cb3a85c0fae06a9386c2a9fbf4a515824bc62c65dbbae953c6f64b1ba735bc428e78a1c7dd1a44611be604bdca204c31b11dce5cf031c5a6275686a3b017fa24c6170c06a174f679b62308d767f284e24b4128d9316312552fa453542dd559ff50c51e1d3c5f127673097559869046fe00012ebe95cda0de8633e39494e56cc8ff5c68f15397c71ae5ecde5b1643c563e0ce2f38b72218e035ad558ed38fec787fa352426272bd0c8fea951af4d663ebfe9622fecad5df5e93d6c588197dbf1c863f12c4bee49ac22435ebe20d7a8d98ca2e80e33fc2244201b6661759c"}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 07:44:22 executing program 1: r0 = fork() waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000140)) ptrace$getsig(0x10, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000080), 0x0, 0x0) [ 130.902192][ T3646] debugfs: File 'dropped' in directory 'loop6' already present! [ 130.923378][ T3646] debugfs: File 'msg' in directory 'loop6' already present! 07:44:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 130.957390][ T3652] blktrace: Concurrent blktraces are not allowed on loop6 [ 130.997488][ C1] sd 0:0:1:0: tag#3792 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 131.007369][ C1] sd 0:0:1:0: tag#3792 CDB: opcode=0xe5 (vendor) [ 131.013748][ C1] sd 0:0:1:0: tag#3792 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 131.022794][ C1] sd 0:0:1:0: tag#3792 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 131.031825][ C1] sd 0:0:1:0: tag#3792 CDB[20]: ba 07:44:23 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000000), 0x4) symlink(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='./file1\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) clone(0x200ab00, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0x80000, 0x0) 07:44:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0) 07:44:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:23 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) 07:44:23 executing program 1: syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') 07:44:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) add_key$fscrypt_v1(0x0, &(0x7f0000000380)={'fscrypt:', @desc3}, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) request_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='syz', 0x0) 07:44:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000dc0)={&(0x7f0000000cc0), 0xc, &(0x7f00000001c0)={&(0x7f0000000d40)={0xffffffffffffffb0, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 131.848144][ T3676] blktrace: Concurrent blktraces are not allowed on loop6 [ 131.871143][ T3681] blktrace: Concurrent blktraces are not allowed on loop6 07:44:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:23 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000440), &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000380)={'fscrypt:', @desc3}, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) request_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='syz', 0x0) 07:44:23 executing program 0: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, 0x0, 0x0) [ 131.893057][ T3692] blktrace: Concurrent blktraces are not allowed on loop6 [ 131.909419][ T3694] blktrace: Concurrent blktraces are not allowed on loop6 [ 131.982861][ C1] sd 0:0:1:0: tag#3793 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 131.992694][ C1] sd 0:0:1:0: tag#3793 CDB: opcode=0xe5 (vendor) [ 131.999033][ C1] sd 0:0:1:0: tag#3793 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 132.008067][ C1] sd 0:0:1:0: tag#3793 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 132.017075][ C1] sd 0:0:1:0: tag#3793 CDB[20]: ba 07:44:24 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x886, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) 07:44:24 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x402, 0x6000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x4b4) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x24}}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000340)={0x0, "fa5fd64c5b96a0d377ebf13855728a8dac1166f21eff9d52bdd47e8237d9f6e31186d78819be344b527b36812eec2137fd5e17a042f9ade71588ee783b2fc2ad"}, 0x48, 0xfffffffffffffffb) request_key(0x0, 0x0, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 07:44:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:24 executing program 3: keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) 07:44:24 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x439480, 0x0) 07:44:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) 07:44:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x4000) 07:44:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc) 07:44:24 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/bus/input/devices\x00', 0x0, 0x0) 07:44:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 132.850001][ T3711] debugfs: File 'dropped' in directory 'loop6' already present! [ 132.860338][ T3711] debugfs: File 'msg' in directory 'loop6' already present! [ 132.970207][ T3728] loop5: detected capacity change from 0 to 264192 [ 132.977961][ T3728] FAT-fs (loop5): bogus number of reserved sectors [ 132.984568][ T3728] FAT-fs (loop5): Can't find a valid FAT filesystem [ 132.993017][ C0] sd 0:0:1:0: tag#3794 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 133.002926][ C0] sd 0:0:1:0: tag#3794 CDB: opcode=0xe5 (vendor) [ 133.009255][ C0] sd 0:0:1:0: tag#3794 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 133.018262][ C0] sd 0:0:1:0: tag#3794 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 133.027275][ C0] sd 0:0:1:0: tag#3794 CDB[20]: ba 07:44:25 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:25 executing program 0: syz_open_procfs(0x0, &(0x7f0000000380)='totmaps\x00') getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) 07:44:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1, 0x8, 0x101}, 0x14}}, 0x0) 07:44:25 executing program 3: openat$hwrng(0xffffff9c, 0x0, 0x759400, 0x0) 07:44:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:25 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) 07:44:25 executing program 3: add_key$user(&(0x7f0000000000), 0x0, &(0x7f0000000080)="c6", 0x1, 0xffffffffffffffff) 07:44:25 executing program 0: r0 = openat$hwrng(0xffffff9c, &(0x7f0000003100), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 07:44:25 executing program 4: r0 = epoll_create(0x7) epoll_pwait(r0, &(0x7f00000008c0)=[{}], 0x1, 0x10, 0x0, 0x0) 07:44:25 executing program 1: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000009dc0)={0x77359400}) 07:44:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002ac0)={&(0x7f0000000140)=@newtaction={0x48, 0x2e, 0x401, 0x0, 0x0, {}, [{0x34, 0x1, [@m_skbmod={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) [ 133.902859][ T3752] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 133.939008][ T3754] loop5: detected capacity change from 0 to 264192 [ 133.946425][ T3754] FAT-fs (loop5): bogus number of reserved sectors [ 133.952999][ T3754] FAT-fs (loop5): Can't find a valid FAT filesystem [ 134.002596][ C0] sd 0:0:1:0: tag#3799 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 134.012466][ C0] sd 0:0:1:0: tag#3799 CDB: opcode=0xe5 (vendor) [ 134.018780][ C0] sd 0:0:1:0: tag#3799 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 134.027786][ C0] sd 0:0:1:0: tag#3799 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 134.036789][ C0] sd 0:0:1:0: tag#3799 CDB[20]: ba 07:44:26 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x3}, {0x6}]}) 07:44:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0xf, &(0x7f0000000100), 0x4) 07:44:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x60, 0x0, 0x0, 0xfffffffd}]}) 07:44:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x34, 0x0, 0x0, 0x81}, {0x6}]}) [ 134.791707][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 134.791718][ T24] audit: type=1326 audit(1641109466.762:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3759 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f636efede99 code=0x0 07:44:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:26 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x7002, 0x0) [ 134.821149][ T24] audit: type=1326 audit(1641109466.772:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3756 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f81180aae99 code=0x0 07:44:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, 0x0) 07:44:26 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2}}) 07:44:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8912, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 07:44:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000840)={@in, 0x0, 0x0, 0x37, 0x0, "f080ce103969fea1e6de4cd714d60491421b0ea6dd8c8d91ac1c1f3f94de81880d33adb7a4b1f85adab93f0aa0e8384cc17390a7e8027c812a8d8efe65e966cb94d36a5b4b944a53cd07fe282974e0c8"}, 0xd8) [ 134.946432][ T3780] loop5: detected capacity change from 0 to 264192 [ 134.953891][ T3780] FAT-fs (loop5): bogus number of reserved sectors [ 134.960458][ T3780] FAT-fs (loop5): Can't find a valid FAT filesystem [ 134.968888][ C0] sd 0:0:1:0: tag#3800 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 134.978818][ C0] sd 0:0:1:0: tag#3800 CDB: opcode=0xe5 (vendor) [ 134.985141][ C0] sd 0:0:1:0: tag#3800 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 134.994170][ C0] sd 0:0:1:0: tag#3800 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 135.003352][ C0] sd 0:0:1:0: tag#3800 CDB[20]: ba 07:44:27 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:27 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 07:44:27 executing program 3: r0 = add_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="d3", 0x1, 0xfffffffffffffffd) keyctl$unlink(0x9, 0x0, r0) 07:44:27 executing program 4: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x80000001) 07:44:27 executing program 1: rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00') 07:44:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002ac0)={&(0x7f0000000140)=@newtaction={0x14, 0x2d, 0x401}, 0x14}}, 0x0) 07:44:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x42, 0x0, 0x0) [ 135.803362][ T24] audit: type=1400 audit(1641109467.772:201): avc: denied { create } for pid=3782 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 07:44:27 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x25, 0x0, 0x0, 0x81}, {0x6}]}) 07:44:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:27 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) 07:44:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000800)={0x2, &(0x7f0000000780)=[{0x1d, 0x0, 0x2}, {}]}) [ 135.836387][ T24] audit: type=1400 audit(1641109467.802:202): avc: denied { getopt } for pid=3782 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 135.903500][ T24] audit: type=1326 audit(1641109467.852:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3798 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f636efede99 code=0x0 [ 135.926991][ T24] audit: type=1326 audit(1641109467.852:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3801 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f27d9c79e99 code=0x0 [ 135.934494][ T3806] loop5: detected capacity change from 0 to 264192 [ 135.963025][ T3806] FAT-fs (loop5): bogus number of reserved sectors [ 135.969609][ T3806] FAT-fs (loop5): Can't find a valid FAT filesystem [ 136.012668][ C0] sd 0:0:1:0: tag#3801 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 136.022629][ C0] sd 0:0:1:0: tag#3801 CDB: opcode=0xe5 (vendor) [ 136.029034][ C0] sd 0:0:1:0: tag#3801 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 136.038052][ C0] sd 0:0:1:0: tag#3801 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 136.047074][ C0] sd 0:0:1:0: tag#3801 CDB[20]: ba 07:44:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:28 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000005cc0)=[{{&(0x7f0000005b80)=@caif, 0x80, 0x0}}], 0x1, 0x0) 07:44:28 executing program 3: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b4721e29e}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8, 0xfffffffffffffffc}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x59c) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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", @ANYRESOCT=r3, @ANYRES32=r1], 0x88}, 0x1, 0x0, 0x0, 0x48004}, 0x48c1) r4 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000440)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001c070000001fffb2aed768634ef7e75eff0080a6c15e29fb3c18faffad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704d00"/105, 0x69, 0x600}, {0x0, 0x0, 0x401}], 0x28104c0, &(0x7f0000000540)={[{@utf8no}, {@utf8}, {@shortname_lower}, {@shortname_lower}, {@numtail}, {@fat=@codepage={'codepage', 0x3d, '855'}}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'macgaelic'}}, {@shortname_win95}, {@shortname_winnt}]}) mkdirat(r4, &(0x7f0000000040)='./file1\x00', 0x2300) mknodat$loop(r4, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x1b, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r3, @ANYBLOB="0184000700"/28], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x4008000) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000001200)=ANY=[@ANYRES32=r0, @ANYRES16, @ANYBLOB="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", @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x20040001}, 0x1) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)='./file1\x00') sendto(r1, &(0x7f0000000f80)="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", 0x266, 0x88d1, &(0x7f0000000a00)=@un=@file={0x1, './file1\x00'}, 0x80) 07:44:28 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000400)={'veth1_to_team\x00', @ifru_addrs=@l2}) 07:44:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{}, {0x24}, {0x6}]}) 07:44:28 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x20001c, 0x0, 0xfa}) 07:44:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:28 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) 07:44:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{}, {0x3d}, {0x6}]}) [ 136.788333][ T24] audit: type=1326 audit(1641109468.762:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3814 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f27d9c79e99 code=0x0 [ 136.818419][ T3810] loop3: detected capacity change from 0 to 6 [ 136.856211][ T3810] ======================================================= [ 136.856211][ T3810] WARNING: The mand mount option has been deprecated and [ 136.856211][ T3810] and is ignored by this kernel. Remove the mand [ 136.856211][ T3810] option from the mount to silence this warning. [ 136.856211][ T3810] ======================================================= 07:44:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000400)={@local, @dev}, 0xc) 07:44:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{}, {0x2c}, {0x6}]}) 07:44:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002ac0)={&(0x7f0000000140)=@newtaction={0x14, 0x2e, 0x401}, 0x14}}, 0x0) [ 136.882512][ T24] audit: type=1400 audit(1641109468.852:206): avc: denied { ioctl } for pid=3821 comm="syz-executor.4" path="socket:[22139]" dev="sockfs" ino=22139 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 136.938143][ T3830] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 136.964569][ T3830] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 136.995507][ T3810] FAT-fs (loop3): codepage cp855 not found [ 137.003726][ T24] audit: type=1326 audit(1641109468.932:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3834 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f636efede99 code=0x0 [ 137.027183][ T24] audit: type=1326 audit(1641109468.932:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3823 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f27d9c79e99 code=0x0 [ 137.051103][ T3841] loop5: detected capacity change from 0 to 264192 [ 137.059797][ T3841] FAT-fs (loop5): bogus number of reserved sectors [ 137.066329][ T3841] FAT-fs (loop5): Can't find a valid FAT filesystem [ 137.076902][ C1] sd 0:0:1:0: tag#3802 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 137.086753][ C1] sd 0:0:1:0: tag#3802 CDB: opcode=0xe5 (vendor) [ 137.093108][ C1] sd 0:0:1:0: tag#3802 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 137.102148][ C1] sd 0:0:1:0: tag#3802 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 137.111211][ C1] sd 0:0:1:0: tag#3802 CDB[20]: ba [ 137.125596][ T3830] batman_adv: batadv0: Removing interface: batadv_slave_0 07:44:29 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) 07:44:29 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:29 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) 07:44:29 executing program 0: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x3131, 0xffffffffffffffff, 0x8000000) 07:44:29 executing program 4: write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e02", 0x11) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) 07:44:29 executing program 3: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 07:44:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0xc}, {0x6}]}) 07:44:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x4c, &(0x7f00000000c0)="3c2c9747", 0x4) 07:44:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x127}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000000)={0x2, 0x0, @loopback}, 0xf, 0x0, 0x0, &(0x7f00000003c0)=ANY=[], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@ip_ttl={{0x14}}, @ip_tos_int={{0x14}}, @ip_tos_int={{0x14}}, @ip_tos_u8={{0x11}}, @ip_tos_int={{0x14}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @private}}}, @ip_tos_int={{0x14}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0xc}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@ssrr={0x89, 0x17, 0x0, [@local, @loopback, @broadcast, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x13, 0x0, [@multicast2, @rand_addr, @multicast2, @remote]}, @ssrr={0x89, 0xb, 0x0, [@dev, @empty]}, @rr={0x7, 0x13, 0x0, [@multicast2, @empty, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}, @ip_ttl={{0x14}}], 0x170}}], 0x3, 0x0) 07:44:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x102, 0x102, 0x3, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x11f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:29 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x280000, 0x0) pselect6(0x40, &(0x7f0000007640), &(0x7f0000007680)={0xffff}, 0x0, 0x0, 0x0) [ 137.975689][ T3870] loop5: detected capacity change from 0 to 264192 [ 137.983249][ T3870] FAT-fs (loop5): bogus number of reserved sectors [ 137.989822][ T3870] FAT-fs (loop5): Can't find a valid FAT filesystem [ 137.998231][ C0] sd 0:0:1:0: tag#3803 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 138.008072][ C0] sd 0:0:1:0: tag#3803 CDB: opcode=0xe5 (vendor) [ 138.014412][ C0] sd 0:0:1:0: tag#3803 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 138.023505][ C0] sd 0:0:1:0: tag#3803 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 138.032508][ C0] sd 0:0:1:0: tag#3803 CDB[20]: ba 07:44:30 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f0000000040)={0x2, 0x0, @remote}, 0x9, &(0x7f0000000140)=[{&(0x7f0000000080)="6ae02232ddff4c49059614acb6453a11bbfc014ed1a4ccee9a08e121786b1fbaa743d9eaa21ff1a4ecc5926810c1c9370aa5784f3be415634ac0c43c23e3345ddee97e6082bda703b3e6d81eacdee9c28c2fb4544744dccdfa699b11d00138393bdbe92a95d07992b864018228d80db96de1ad9fc28be99c031458712fcddd364d4764", 0x83}], 0x1, &(0x7f0000001c80)=ANY=[@ANYBLOB="1100000000000000000000000100000001000000000000008000000000000000000000000700000044342a61ac1414aa000000056401010000000005e000000280000001ac1414bb000000037f000001fffffff9ac1414bb0000001f830f07000000007f000001ac141436072b9cac1e0101ac141430ac1414aa7f00000164010100ac1e0101640101007f000001ac1e0101ac1414bb00001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1e0101e000000100000000140000000000000000000000020000000400000000f9ff0014000000000000000000000001000000ff07000000000000380000000000000000000000070000008626000000010210741486e3149ab83db6183a6a696402109521b3ec0cf93382246038f8b2d2000044afde91d645b095460395e81b8ec28acfabb4bfabc0bd8505144044eb0e796c29a8645ccbea224f47c2a0a99676d7f0e3"], 0x120}}, {{&(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10, &(0x7f0000001e00)=[{&(0x7f0000000200)="3f506245e80052efa56254b26ad855b2ddbd76b61e480ece918d76b712778f068464b1fd11a87423928bd6bc37990cfe81a555752452ff62c831b781fc7b27d027cec293d9fdf57fbbeee42ce5f12c37eb43e8e49f65a4b432b4b579c39ee0d25626967f974d90962a63797fe7c96760e6a93e1c6bc60ff17874527b1c36a577d8e2118fe7efa364d97f8d731a6a0585b2cf38d4", 0x94}, {&(0x7f0000000440)="53aee1e110f4267f53c8ecc0de9d95f06ecb7af01bbfae96297c0074cc1abd688534fef8e13c2b2ffc552286f9693f01615ee45a3cdf5c612065b9689bbd36dbc8769c853bc47f709b24b41f79e70cf8c16572eccf1e62066fe3b2549bb7c898c23f6d94df5d3a4783775d001db5667f341fcebe198ba20f90b430f44f0a7b6862b16e995e58e2289096f221c077e38531b2c5eb55a091d711c32b6864e4eac721017c4d62ebeced53425d734fdfbf64d063016bf25de5a6bda0a0607af8da801d57c8a7510e9290efc3d5e0ebf9f8d6d4", 0xd1}, {&(0x7f0000000540)}, {&(0x7f0000000580)="e69e5f6d1b0cb001bbf56d187f405c5fee0108b575c38d976c038530b4a85bb5cf045fe1f2ba94d7", 0x28}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f0000000300)="50d9bfa7f819351fe0a1c238a7c119252760902560de7a0a3411ee33c19e3a0d784e31aad8c14b351b", 0x29}, {&(0x7f0000000340)="e9414b576754b58533799c67d25f3814b6bbce1ad7d3549c4cedbb9429d14c41c7c2ebd4f4a32e9d8908bbfbd6bf89c35564a3697433602febfa6629c5380a2ba04588df03812f606fe03cff39b54d0509716de9ec3aca079824f279004a355512e012e2cb84f8ca0666b4a2eeafba1e52cce155a667eac4378678954058653d3b09daf106b8d0dc0e3b0b6c2279d33ce170401016a99a0e104f61e9ce4f25c685a199d11e871997ea9e7786636fccec15afbb3e721f7d51426312", 0xbb}], 0x7, &(0x7f0000001680)=[@ip_retopts={{0x48, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c}, @rr={0x7, 0x1b, 0x0, [@broadcast, @local, @multicast2, @multicast2, @rand_addr, @loopback]}]}}}, @ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x80}}, {{&(0x7f0000001740)={0x2, 0x0, @dev}, 0x10, &(0x7f0000001940)=[{&(0x7f0000001780)="39cafd3a2bb33cd827d3a7611f1af4662ec460a3ca1cac49d6e6f204ec6b0a94b65426d0528637d47d2612fad5c5c3cb094510598c95cb8d5a1a2ebc40a74433ffa1d7feb7e966b9551f1d84d2cc2ff66643b3c611e5c621c0118feecec6e2c526f5e34db6ef63fb95b855ccca3326fdb402bff8e6b746fc3824c07d90996fcca547bc7e372472953e9a4bd35e61a314e66be40849d2168be59db59abcf7313457b309683b799fcf6799295c701cd686e28e27862af3ea2b161fe5ea633ff740c08249a8", 0xc4}, {&(0x7f0000001880)="999f799b427b4c2f5c0a9186ba17c63e10cb640d0fbcd97b6999296b5360c6612a0ae7f13af59e3397367755cd4575df232de6a963caad02c4c950e55b1f9797c34fa5761982e01fe2cc0e68ad89a04635ae5be83cd78383aecf0fb5fb93c4172d6aeefdb96d0a3d0c56549801b44061767cc42501748003e20db4d27d14dfd262fc387f2af67e072d3e0a832b54fe1edceee5e47af4b560fd292ce0981262e9d7920027d53a575824455855de25f66cfb3d4ceddbe6cb6d", 0xb8}], 0x2, &(0x7f0000001980)=[@ip_tos_int={{0x14}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}], 0x3, 0x20004040) 07:44:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a40)=[{{&(0x7f0000000080)={0xa, 0x4e21, 0x0, @mcast1, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="24000000000000002900000032000000fe8000000000aae27ec8fab71a4111d7d2"], 0x28}}], 0x1, 0x0) 07:44:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="131263b52c4495edec5f01"], 0x38}}, 0x0) 07:44:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x102, 0x102, 0x3, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x11f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:30 executing program 1: r0 = socket(0x2, 0x3, 0xff) sendmmsg$inet(r0, &(0x7f0000003600)=[{{&(0x7f0000000200)={0x2, 0x0, @private=0xa010102}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x18}}], 0x1, 0x0) 07:44:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x101, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 07:44:30 executing program 4: socket$unix(0x1, 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) pselect6(0x40, &(0x7f0000007640), &(0x7f0000007680)={0x10001}, &(0x7f00000076c0)={0x6918}, 0x0, 0x0) 07:44:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x102, 0x102, 0x3, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x11f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:30 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0x4) 07:44:30 executing program 3: futex(&(0x7f00000002c0), 0x6, 0x0, &(0x7f0000000300)={0x77359400}, 0x0, 0x0) 07:44:30 executing program 1: socket(0x2, 0x3, 0xff) [ 138.943439][ T3896] loop5: detected capacity change from 0 to 264192 [ 138.951316][ T3896] FAT-fs (loop5): bogus number of reserved sectors [ 138.957919][ T3896] FAT-fs (loop5): Can't find a valid FAT filesystem [ 138.967015][ C0] sd 0:0:1:0: tag#3808 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 138.976863][ C0] sd 0:0:1:0: tag#3808 CDB: opcode=0xe5 (vendor) [ 138.983181][ C0] sd 0:0:1:0: tag#3808 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 138.992190][ C0] sd 0:0:1:0: tag#3808 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 139.001210][ C0] sd 0:0:1:0: tag#3808 CDB[20]: ba 07:44:31 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000005e80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000013c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x4, [@multicast1]}]}}}], 0x18}}], 0x1, 0x0) 07:44:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000380)={0x74, r1, 0x1, 0x0, 0x0, {{}, {@void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0x1, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x74}}, 0x0) 07:44:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x3, 0x4) 07:44:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f00000037c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c, 0x0}}], 0x1, 0x20040040) recvfrom(r0, 0x0, 0x44, 0x40010142, 0x0, 0x0) 07:44:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@ip_pktinfo={{0xfffffffffffffe9f, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}], 0x20}}], 0x2, 0x0) 07:44:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) 07:44:31 executing program 4: socket$unix(0x1, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000007640), &(0x7f0000007680)={0x10000}, &(0x7f00000076c0)={0x6918}, 0x0, 0x0) 07:44:31 executing program 4: sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000019c0)=ANY=[@ANYBLOB="8af8a5f178aef2cf0ad13b086c24371f2ac1d77698e4d823a40aa2b356b0f77662885db8b90ccdebde7ad6946e114484f47fa7caa0c5281c39738d02699b4a7065f0c278df64cce93a5bd240b4681d69bd0d4becccc8dc5fab0bd6b3dc67c19074a25a6334082984c93f8058eb6dc0e4d012421cfb1ac7f91a", @ANYBLOB="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", @ANYRESOCT, @ANYBLOB="63b611ea667f6b58ca06b6803cc1d3343a4dc30a837f664f935c6b893b628ceef09b0504602055352defeb5811a64e6cd271b4cbe4e16b1477e6ea381a275773aba61a11dee942fed760c293a42dee42f7d9e392ecccc54422f3"], 0x48}}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000001bc0), 0x22, 0x0) 07:44:31 executing program 3: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@empty, @link_local, @val={@void}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "8ada90", 0x2c, 0x6, 0x0, @rand_addr=' \x01\x00', @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xc7, 0x0, 0x0, 0x0, 0x4e24}}}}}}}}}}}, 0x0) [ 139.793871][ T3901] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.3'. [ 139.822390][ T3907] syz-executor.1 (3907) used greatest stack depth: 10208 bytes left [ 139.921853][ T3922] loop5: detected capacity change from 0 to 264192 [ 139.929875][ T3922] FAT-fs (loop5): bogus number of reserved sectors [ 139.936474][ T3922] FAT-fs (loop5): Can't find a valid FAT filesystem [ 139.944889][ C1] sd 0:0:1:0: tag#3809 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 139.954751][ C1] sd 0:0:1:0: tag#3809 CDB: opcode=0xe5 (vendor) [ 139.961255][ C1] sd 0:0:1:0: tag#3809 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 139.970267][ C1] sd 0:0:1:0: tag#3809 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 139.979293][ C1] sd 0:0:1:0: tag#3809 CDB[20]: ba 07:44:32 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:32 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) socket$unix(0x1, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000007700)) pselect6(0x40, &(0x7f0000007640), &(0x7f0000007680)={0x10000}, &(0x7f00000076c0)={0x6918}, 0x0, 0x0) 07:44:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000013c0)=ANY=[@ANYBLOB="14000000", @ANYBLOB="130025"], 0x38}}, 0x0) 07:44:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080), 0x4) 07:44:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000001840)=[{{&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x80, 0x0}}], 0x1, 0x0) 07:44:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='X', 0x1}], 0x1}}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000001740)=[{&(0x7f0000000540)='y', 0x1}], 0x1}}], 0x2, 0x0) 07:44:32 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00', @ifru_addrs=@phonet}) 07:44:32 executing program 3: r0 = socket(0xa, 0x803, 0x2) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000140)) 07:44:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:32 executing program 0: r0 = socket(0x2, 0x3, 0xff) sendmmsg$inet(r0, &(0x7f0000006e40)=[{{&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000040)="e9de06", 0x3}, {&(0x7f0000000080)="027a820de6af48bdf2a10532d050abbece3673ecadafdf056f2a70d78bd4c7368256eb38ea933a89e73d25ae6f05cc712e755d21c3ef6747a9629c0a64f0295d3622983366634df25b48606f68e7e2cb7a34d40e18c359a36a831f2214ca187672ed7155c276cebc357d51736fd14d857c42fb71111cd88477575f67c933e503533cee13488cbc420792a80d7a358bca36adfab695415aaa2b21cc5b0917e6537388603a31e12d4f98018ca4cf04f16725f65f6b019cad28d8b9c50399b5897170ec80e92650", 0xc6}], 0x2}}, {{&(0x7f0000000240)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}}], 0x2, 0x0) 07:44:32 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000025c0)=[{&(0x7f00000000c0)=""/156, 0x9c}], 0x1, 0x6, 0x0) [ 140.872260][ T3941] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.911273][ T3949] loop5: detected capacity change from 0 to 264192 [ 140.919231][ T3949] FAT-fs (loop5): bogus number of reserved sectors [ 140.925760][ T3949] FAT-fs (loop5): Can't find a valid FAT filesystem [ 140.935035][ C1] sd 0:0:1:0: tag#3810 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 140.944891][ C1] sd 0:0:1:0: tag#3810 CDB: opcode=0xe5 (vendor) [ 140.951224][ C1] sd 0:0:1:0: tag#3810 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 140.960246][ C1] sd 0:0:1:0: tag#3810 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 140.969251][ C1] sd 0:0:1:0: tag#3810 CDB[20]: ba 07:44:33 executing program 4: r0 = socket(0x2, 0x3, 0xff) sendmmsg$inet(r0, &(0x7f0000003ac0)=[{{&(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) 07:44:33 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000100), 0x4) 07:44:33 executing program 0: futex(&(0x7f0000000300), 0x5, 0x0, 0x0, &(0x7f0000000380), 0x0) 07:44:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003a80)=[{{&(0x7f0000001380)=@l2tp={0x2, 0x0, @dev}, 0x80, 0x0}}], 0x1, 0x0) 07:44:33 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:33 executing program 0: r0 = socket(0x2, 0x3, 0xff) sendmmsg$inet(r0, &(0x7f0000003600)=[{{&(0x7f0000000200)={0x2, 0x0, @private}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000240)="ff05d20eba402c6933e1d8a3", 0xc}, {&(0x7f0000000280)="b6e6885b795fa3d9", 0x8}], 0x2, &(0x7f0000000340)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x18}}], 0x1, 0x40008d0) 07:44:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @dev}}}], 0x20}}], 0x2, 0x0) 07:44:33 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000000)) 07:44:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x40012040, 0x0) 07:44:33 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, 0x0, &(0x7f00000000c0)) 07:44:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x84, 0x7, 0x0, 0x0) 07:44:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:33 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect(r0, 0x0, 0x0) 07:44:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@empty, @in6=@loopback}}, {{}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff07) 07:44:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x13, 0x0, 0x0) [ 141.841814][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 141.841825][ T24] audit: type=1400 audit(1641109473.812:210): avc: denied { create } for pid=3965 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 141.879843][ T3978] loop5: detected capacity change from 0 to 264192 [ 141.932083][ T24] audit: type=1400 audit(1641109473.852:211): avc: denied { create } for pid=3979 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 141.937972][ T3978] FAT-fs (loop5): bogus number of reserved sectors [ 141.952211][ T24] audit: type=1400 audit(1641109473.852:212): avc: denied { connect } for pid=3979 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 141.958671][ T3978] FAT-fs (loop5): Can't find a valid FAT filesystem [ 141.978534][ T24] audit: type=1400 audit(1641109473.862:213): avc: denied { getopt } for pid=3965 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 142.008344][ C1] sd 0:0:1:0: tag#3811 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 142.018190][ C1] sd 0:0:1:0: tag#3811 CDB: opcode=0xe5 (vendor) [ 142.024607][ C1] sd 0:0:1:0: tag#3811 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 142.033624][ C1] sd 0:0:1:0: tag#3811 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 142.042627][ C1] sd 0:0:1:0: tag#3811 CDB[20]: ba 07:44:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:34 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 07:44:34 executing program 3: socketpair(0x10, 0x3, 0x9, &(0x7f0000000380)) 07:44:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000100)={'nat\x00'}, &(0x7f00000001c0)=0x78) 07:44:34 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001840)={0x38, 0x2, 0x9, 0x401, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @private}}}]}]}, 0x38}}, 0x0) 07:44:34 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) 07:44:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000200)=@get={0x1, &(0x7f0000000100)=""/235, 0x1}) 07:44:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @empty}, 0x10) 07:44:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:34 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @dev, @loopback}, &(0x7f0000000480)=0xc) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000002c0)={0x0, @empty, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x3e}, 0x2c) [ 142.719866][ T24] audit: type=1400 audit(1641109474.692:214): avc: denied { create } for pid=3988 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 142.743450][ T3997] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 142.751693][ T3997] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 07:44:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x210) 07:44:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x3, 0x0, 0x0) [ 142.805510][ T24] audit: type=1400 audit(1641109474.712:215): avc: denied { read } for pid=3988 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 142.805525][ T4014] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 [ 142.901962][ T4023] loop5: detected capacity change from 0 to 264192 [ 142.909602][ T4023] FAT-fs (loop5): bogus number of reserved sectors [ 142.916161][ T4023] FAT-fs (loop5): Can't find a valid FAT filesystem [ 142.925204][ C1] sd 0:0:1:0: tag#3812 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 142.935157][ C1] sd 0:0:1:0: tag#3812 CDB: opcode=0xe5 (vendor) [ 142.941473][ C1] sd 0:0:1:0: tag#3812 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 142.950476][ C1] sd 0:0:1:0: tag#3812 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 142.959512][ C1] sd 0:0:1:0: tag#3812 CDB[20]: ba 07:44:35 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:35 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @fixed}, 0xe) 07:44:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000040)="e728da571cbbbae927807dddb96e86c2a7957cf8d22803e68e1db01083d215207b2084fdf92505cacca55a30d1cba135f0adc9dd895ca9b6234e5ef0d3524a1bd6bbd2a9a85f0e61220d7e06af0dd92219200b4555448f3964970bc3ae74e84a479032dc144b3a7f117a1bbbe69941390b95fbe3aed5ed80de686ddc7bef7ccf89736804ec5123275ae523010ed6f86e4ac624bde431e48b12fb5aa9421304973680df20c1f689bd22bb403af7fa42651bf2e090a336c07e9705de317aaf511cbd6dccba3bf17b74a02530a9edac92c6e3e655f503e33e06d0dcd680670e39f5e6ee5d3305d881a70a398bc2d859", 0xee, 0x10000000, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0xfffffffffffffcc5) 07:44:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:35 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000500)='R') 07:44:35 executing program 0: socketpair(0x23, 0x0, 0x401, &(0x7f0000002ac0)) 07:44:35 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f00000001c0)) 07:44:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @rand_addr=0x64010102}], 0x10) 07:44:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000280)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) [ 143.752846][ T24] audit: type=1400 audit(1641109475.722:216): avc: denied { ioctl } for pid=4027 comm="syz-executor.3" path="socket:[23005]" dev="sockfs" ino=23005 ioctlcmd=0x48d3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 143.778313][ T24] audit: type=1400 audit(1641109475.722:217): avc: denied { bind } for pid=4025 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 07:44:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$netlink(r0, &(0x7f0000000040)=@proc, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)={0x20, 0xa, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 07:44:35 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x0, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @private}}}, 0x108) [ 143.857625][ T24] audit: type=1400 audit(1641109475.822:218): avc: denied { connect } for pid=4042 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 143.892480][ T4050] loop5: detected capacity change from 0 to 264192 [ 143.908567][ T4050] FAT-fs (loop5): bogus number of reserved sectors [ 143.915236][ T4050] FAT-fs (loop5): Can't find a valid FAT filesystem [ 143.924513][ C1] sd 0:0:1:0: tag#3817 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 143.934478][ C1] sd 0:0:1:0: tag#3817 CDB: opcode=0xe5 (vendor) [ 143.940835][ C1] sd 0:0:1:0: tag#3817 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 143.949861][ C1] sd 0:0:1:0: tag#3817 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 143.958887][ C1] sd 0:0:1:0: tag#3817 CDB[20]: ba 07:44:36 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'vlan1\x00', {'macvlan0\x00'}}) 07:44:36 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) 07:44:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_mreq(r0, 0x84, 0x24, &(0x7f0000000040)={@local}, 0x8) 07:44:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000c40)={&(0x7f00000001c0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000240)='*', 0x1}], 0x1, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x5c8}, 0x0) 07:44:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@broadcast, @empty}, 0x10) 07:44:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x23) 07:44:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000001280)=[@in={0x2, 0x0, @remote}], 0x10) 07:44:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000400)={'ah\x00'}, &(0x7f0000000440)=0x1e) 07:44:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x7, 0x0, 0x3) [ 144.749490][ T24] audit: type=1400 audit(1641109476.722:219): avc: denied { ioctl } for pid=4051 comm="syz-executor.4" path="socket:[23068]" dev="sockfs" ino=23068 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 144.867537][ T4076] loop5: detected capacity change from 0 to 264192 [ 144.874908][ T4076] FAT-fs (loop5): invalid media value (0x00) [ 144.880956][ T4076] FAT-fs (loop5): Can't find a valid FAT filesystem [ 144.892447][ C1] sd 0:0:1:0: tag#3818 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 144.902327][ C1] sd 0:0:1:0: tag#3818 CDB: opcode=0xe5 (vendor) [ 144.908671][ C1] sd 0:0:1:0: tag#3818 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 144.917716][ C1] sd 0:0:1:0: tag#3818 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 144.926727][ C1] sd 0:0:1:0: tag#3818 CDB[20]: ba 07:44:37 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000140)={'nat\x00', 0x2, [{}, {}]}, 0x48) 07:44:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0xa, 0xa, 0x401, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 07:44:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:37 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000000)={'batadv_slave_0\x00'}) 07:44:37 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x40005) 07:44:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000040)="d6cf1a7ef4fd8f8eaa1571af", 0xc) 07:44:37 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x1410, 0x0, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8}, @RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0xffffffffffffffd6}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID]}, 0x17}}, 0x0) 07:44:37 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x10, 0x0, 0x0) 07:44:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000000340)="1a", 0x1, 0x48080, &(0x7f0000000380)={0x2, 0x4f20, @empty}, 0x10) 07:44:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 145.834144][ T4103] loop5: detected capacity change from 0 to 264192 [ 145.841763][ T4103] FAT-fs (loop5): invalid media value (0x00) [ 145.847937][ T4103] FAT-fs (loop5): Can't find a valid FAT filesystem [ 145.856385][ C0] sd 0:0:1:0: tag#3819 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 145.866411][ C0] sd 0:0:1:0: tag#3819 CDB: opcode=0xe5 (vendor) [ 145.872822][ C0] sd 0:0:1:0: tag#3819 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 145.881852][ C0] sd 0:0:1:0: tag#3819 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 145.891005][ C0] sd 0:0:1:0: tag#3819 CDB[20]: ba 07:44:38 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @empty}], 0x1c) 07:44:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x84, 0x3, 0x0, 0x0) 07:44:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2c, 0x1, 0x2, 0x3, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @empty}}}]}]}, 0x2c}}, 0x0) 07:44:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000040)=@ethtool_cmd={0x1e}}) 07:44:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x0, 0xb, 0x201, 0x0, 0x0, {}, [@NFTA_COMPAT_NAME={0x6, 0x1, '\'\x00'}]}, 0x1c}}, 0x0) 07:44:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x84, 0x4, 0x0, 0x0) 07:44:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f00000000c0)='<', 0x1) 07:44:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x14, 0x1, 0x7, 0x401}, 0x14}}, 0x0) 07:44:38 executing program 3: socketpair(0x2, 0x3, 0x5, &(0x7f0000000000)) [ 146.808842][ T4130] loop5: detected capacity change from 0 to 264192 [ 146.817211][ T4130] FAT-fs (loop5): invalid media value (0x00) [ 146.823264][ T4130] FAT-fs (loop5): Can't find a valid FAT filesystem [ 146.831775][ C0] sd 0:0:1:0: tag#3820 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 146.841590][ C0] sd 0:0:1:0: tag#3820 CDB: opcode=0xe5 (vendor) [ 146.847914][ C0] sd 0:0:1:0: tag#3820 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 146.856921][ C0] sd 0:0:1:0: tag#3820 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 146.865955][ C0] sd 0:0:1:0: tag#3820 CDB[20]: ba 07:44:39 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:39 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f00000000c0)) 07:44:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}, 0x5c5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)='veth0_vlan\x00'}) 07:44:39 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x141340, 0x0) 07:44:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x30, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FLAGS={0x8}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}}, 0x0) 07:44:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r0, &(0x7f0000005a40)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000003280)={0x0, 0x0, &(0x7f0000003240)={&(0x7f00000031c0)=ANY=[@ANYBLOB="80000000000b01"], 0x80}}, 0x0) [ 147.668801][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 147.668815][ T24] audit: type=1400 audit(1641109479.642:223): avc: denied { ioctl } for pid=4132 comm="syz-executor.4" path="socket:[23202]" dev="sockfs" ino=23202 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 07:44:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:39 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000080)={0x84, @remote, 0x0, 0x3, 'nq\x00'}, 0x2c) 07:44:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, 0x0, &(0x7f0000000380)) [ 147.700485][ T24] audit: type=1400 audit(1641109479.662:224): avc: denied { read } for pid=4142 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 07:44:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:39 executing program 0: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x80012001, 0x0) [ 147.741522][ T4149] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.3'. [ 147.799969][ T4158] loop5: detected capacity change from 0 to 264192 [ 147.807178][ T4158] FAT-fs (loop5): invalid media value (0x00) [ 147.813223][ T4158] FAT-fs (loop5): Can't find a valid FAT filesystem [ 147.824672][ C1] sd 0:0:1:0: tag#3821 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 147.834548][ C1] sd 0:0:1:0: tag#3821 CDB: opcode=0xe5 (vendor) [ 147.840885][ C1] sd 0:0:1:0: tag#3821 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 147.849892][ C1] sd 0:0:1:0: tag#3821 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 147.858906][ C1] sd 0:0:1:0: tag#3821 CDB[20]: ba 07:44:40 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x10, 0x6, 0x401}, 0x14}}, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 07:44:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x0, 'veth0_to_team\x00'}, 0x18) 07:44:40 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'gre0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @remote}}}}) 07:44:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x4, 0x0, 0x0) 07:44:40 executing program 1: pipe(&(0x7f00000002c0)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 07:44:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) 07:44:40 executing program 4: r0 = socket(0x11, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r1, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r1, &(0x7f0000000c40)={&(0x7f00000001c0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000240)="2a153295d4646b26171d317f0b0957d06de02424a7a08603d341ddc4798fb4502c8a937d1501d165e2f85997ce1ac70ece5ef07c225e22016593008110cbfa48d2f31f8062aa59314017850cc0dc86702e4e0be1862e38585bc8c3ea2894fac9a25ee31af50dd67b8ca19891780d8178d780547e9968c01016808aa23392b4f744d0ab51e3539dcd7a88e172dabc1811a35438ab6eba9d558ddfc512a83fdc7204babc4c44c6af172f8549f18e1c6e735bbcca6aeecded593072fccd6e91", 0xbe}, {&(0x7f0000000340)="37b25b9f71df5d2c1af8b24af7f239f90a28fd3ea7f9611f131d11df581f9dede7dfb6adb4e34a0ab6c73652f02b8d2a5af5bd9938dc23efea67a1bdee54d3fb70b5be55c0199947d0b1dde11bc439af308cffacb7ae6d3047d2556b73445a26e0f3f3ebe65e81518afa6c77c0db47c088936141", 0x74}, {&(0x7f0000000100)}, {&(0x7f0000000400)="eacacce03e8159bf491a145194a4ca74d09b02a4598ad1cf39f40be617755022e9000d741e726c90567057af005bd45bef0f32f97cdacfe404b3466defdbf9b606782ff649734b9ff32e48e46389f26970b9c95552d4825c61e38d5e9c1e24c62e67", 0x62}, {&(0x7f0000000480)}, {&(0x7f0000000500)="bdda0e1766df8a39b96a60011debb9f699011f23333be661925a2c8ce702c8df6a5fe78305c41deb95b0ee4b986c0d8eabbc11cc325466827e24c94107307cb6ad7edfffcc9e45217ab3571735dc606202bbf0f2fa25a6be1dd25049bf062ee96870a24baa66a55f8af19d164cdd202faadf3c763e6a51d8a293ce2d", 0x7c}], 0x6, &(0x7f0000000d00)=ANY=[@ANYBLOB="78000000000000003a00000081000000775ff8d5bcc5f8d958d696c372ad9b0f3be62929f29781929995923822838a4d6e99cf09954b78e70b436a92bd86329874228ed81a63934f38b428e5a318c22ad5640dffd85cb121a0ed6ff2ed97a60184be0388c5171802bac10ee81d69e7f6472853a02519ce2e8800000000000000170100009d000000250f0e9bdda450e72e28fd9dc01e9f84f92e53b7a2fe065ae99d7c256cb946592a421304a9d1f5c37ff022fa24679d0bff318ac70abde155fa17a0c83da2489082d231b9802e2ef30ed747745b5b3c1810fb427fdf23cdca80b3536da8b81cce7109d8eea798dd6b0a4a59d26321f424a89ddcc387cb000000010000000000000000000029f40000ae7b1337388e010b7b8db7a603d8d02685d9013272b815eb86bcc34cbae8e5eebf74b328ba9b76b81a8aeb359d30a1228ecb06e53485666a68edd660033fc35ea1cabc8d9fcb764ae5ceb799e9bc400b5cf928fbd625e4f37e7ecd7275653d155ffad99e4d734e20608870f1645643a89a7d0fa9f10356fc6325098652b04b1fcbe025accd4386bcc1035e6502f68ea5688f0c1377ce72a6a1c238e199d01b221cf62fa2b2a4f5c224fc81fc1e3e5e0fecf4bb725071c397819c9ae142ac2366101401c4274157180359bed7a468b3b60e171b12895b80f6d91054c6bb239c15bf5f6a75d3bc1618206000000000000038000000000000001201000005000000bda7ac117ad588109fd424743c22e5017eed7633211e3270e29fcbdd10543a310a88d8c111a9000020000000000000000100000001000100ce61c9a7eb6d2bf75e2359114d56bb89b80000000000000011010000e90500001bc865f1a334c428e0a7eb49e5e80733119a9e61ec8d3baea66902cefb9a22db8aa16afca05bf6dec548322b35eeb8d06f61c021e92f9c6e991a57edc53a3413a1e11487e149d2bfd890e7fbc307d6238f3f8acab8553626ec3d1c5a21f5a04435f91ae635d0762646e1722ccd44bce39e94a03c9cc3a8bb8585e3567611a6b5ca5b6edbab8ec9c4ee8167c5f19426f22ba91fccb32bacaced4ec978c152ebbc6b00000000000000000100000000000000000000ff070000cc625e71cfbd5a923e8d1a41ae9f70aea9081066ea3c98cf0c9e3c261c9f05ae3b46e0c656790417fc5fc07b016572fd9790826925196020356d04b33927a166fa6c4e0656a3c321ce725f073c9d00371201a92ac1c6d3218f5c731149bb0c09eaafcb377ac6abaf73a2ecd7b98ad6f861fb3f6ba09caadc7944e2b27e3a2854d49b544d42b655835c1e4299ae2d20eaaaa2e08b0bd8783b741ad10cc9bb797b9041194827487fefcf2032c21854469c8ec363c35bb5d5af860ccf0fa97d27b71b1d9c1a5ade0d64b49ee99cac1e878bc71d5b3112e3c09d24339920dbc98bf0f42150a7cdb16a3ed1974f179ecd8790c0000000000000000b01000001000100e4dd6fe0515eff33396d5d2540cc7bc8c466d76ee6fb041016c47f7e8fbf89387f0dae5ca3647b61d8aed3196ca67f7ed23f0516c33d0a0708ad910771ba3764e4b51b8014b2a20bc4a50f39308934c0d6d53d61c665e122c26dbce382cac6d435d7415f76832866d26ed84df7186d12e66d2f482ccfb04a25f0f9cdcda613ce768568e64c9c2d4af4785dbb85f165f958a3b5b67f0d27775e10181e2a478c6d900c517afbf8f99b14d396728d910000f8000000000000000801000005000000ad18ebb4b4f700daae623a2ea4c1d5fe61bca262eb35b238127778c2d9f7a73d85577e685b926431ced7547544988dbdf133ccf03993ccb478c88ec62507c231bc5593b4119070e0ff9a918e66f549124939e831c3dc764fcb3eff64819694f94d20a32e9c67135c3af0331b"], 0x5c8}, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000003100)={0x8, 'netpci0\x00', {'veth0_to_bridge\x00'}}) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000cc0)={0x9, [0x0, 0x1f], 0x9}, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x34}, 0x1, 0x0, 0x0, 0x4800}, 0x0) 07:44:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in, 0x0, 0x0, 0x0, 0x0, "b8619f372cbc2dd41a47ba43940d98877ff1a3b398d8b886170210d2d31af863b2c79abdbe914c1947b5c93d1f09c9d7fdae50407f18833200f4c8dedce7b0087871ff0c4b3070bd0001c9fe8bcfdd66"}, 0xd8) 07:44:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:40 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) connect$inet(r1, &(0x7f0000000100)={0x10, 0x2}, 0x10) [ 148.772353][ T4185] loop5: detected capacity change from 0 to 264192 [ 148.779652][ T4185] FAT-fs (loop5): invalid media value (0x00) [ 148.785653][ T4185] FAT-fs (loop5): Can't find a valid FAT filesystem [ 148.795830][ C1] sd 0:0:1:0: tag#3826 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 148.805712][ C1] sd 0:0:1:0: tag#3826 CDB: opcode=0xe5 (vendor) [ 148.812050][ C1] sd 0:0:1:0: tag#3826 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 148.821059][ C1] sd 0:0:1:0: tag#3826 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 148.830105][ C1] sd 0:0:1:0: tag#3826 CDB[20]: ba 07:44:41 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) dup2(r0, r1) 07:44:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000040), 0x80) 07:44:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 07:44:41 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) 07:44:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x384}, 0x98) sendmsg$inet_sctp(r0, &(0x7f0000001580)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000080)=[{&(0x7f00000001c0)='E', 0x1}], 0x1}, 0x0) 07:44:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000001c0)={0x0, @in, 0x0, 0x0, 0x6}, 0x98) 07:44:41 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="92", 0x1, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x3}, 0x1c) 07:44:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x20188, 0x0, 0x0) 07:44:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 149.738445][ T4214] loop5: detected capacity change from 0 to 264192 [ 149.745757][ T4214] FAT-fs (loop5): invalid media value (0x00) [ 149.751798][ T4214] FAT-fs (loop5): Can't find a valid FAT filesystem [ 149.759879][ C0] sd 0:0:1:0: tag#3839 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 149.769828][ C0] sd 0:0:1:0: tag#3839 CDB: opcode=0xe5 (vendor) [ 149.776227][ C0] sd 0:0:1:0: tag#3839 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 149.785286][ C0] sd 0:0:1:0: tag#3839 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 149.794363][ C0] sd 0:0:1:0: tag#3839 CDB[20]: ba 07:44:42 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x38d}, 0x98) 07:44:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000003c0), 0x10) 07:44:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000100)="6584013cff864e9fba51669633dec1111898bb01575be3859ac6d5ca85ffa2ff65b0008e6be7579791c07779c6e9cee4f7e6d2beef0fb4cc99ad9066b648e82d60f0d8706a060027021d1bdd8d", 0x4d, 0x0, &(0x7f0000000180)={0x10, 0x2}, 0x56) 07:44:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000080)=0x8) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000100)={r5}, &(0x7f0000000140)=0x8) 07:44:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000012c0)={0x0, 0x8, 0x1, 'P'}, 0x9) 07:44:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 07:44:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000012c0)={r3}, 0x8) 07:44:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:42 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) [ 150.715987][ T4245] loop5: detected capacity change from 0 to 264192 [ 150.724467][ T4245] FAT-fs (loop5): bogus number of FAT sectors [ 150.730606][ T4245] FAT-fs (loop5): Can't find a valid FAT filesystem [ 150.739862][ C1] sd 0:0:1:0: tag#3776 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 150.749789][ C1] sd 0:0:1:0: tag#3776 CDB: opcode=0xe5 (vendor) [ 150.756120][ C1] sd 0:0:1:0: tag#3776 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 150.765146][ C1] sd 0:0:1:0: tag#3776 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 150.774260][ C1] sd 0:0:1:0: tag#3776 CDB[20]: ba 07:44:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000340), 0x8) 07:44:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) dup2(r2, r0) r3 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0xa, &(0x7f0000000140), &(0x7f0000000000)=0x98) 07:44:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x2) 07:44:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:43 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x84, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 07:44:43 executing program 0: chown(&(0x7f0000000a80)='./file0\x00', 0x0, 0x0) 07:44:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x8, &(0x7f0000000000), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 07:44:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x0, 0x1, '\n'}, 0x9) 07:44:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:43 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) connect(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 07:44:43 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f00000003c0)={0x1c, 0x1c, 0x3}, 0x1c) 07:44:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000200), &(0x7f0000000300)=0x8) 07:44:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 07:44:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) dup2(r0, r1) [ 151.725260][ T4285] loop5: detected capacity change from 0 to 264192 [ 151.732773][ T4285] FAT-fs (loop5): bogus number of FAT sectors [ 151.738885][ T4285] FAT-fs (loop5): Can't find a valid FAT filesystem [ 151.747037][ C0] sd 0:0:1:0: tag#3777 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 151.756891][ C0] sd 0:0:1:0: tag#3777 CDB: opcode=0xe5 (vendor) [ 151.763242][ C0] sd 0:0:1:0: tag#3777 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 151.772264][ C0] sd 0:0:1:0: tag#3777 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 151.781720][ C0] sd 0:0:1:0: tag#3777 CDB[20]: ba 07:44:44 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 07:44:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000003a00)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000003900)=[{&(0x7f00000024c0)='o', 0x1}], 0x1, &(0x7f0000003980)=[@sndrcv={0x2c}], 0x2c}, 0x0) 07:44:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:44 executing program 0: readv(0xffffffffffffffff, &(0x7f0000001740)=[{0x0}, {0x0}, {0x0}], 0x3) 07:44:44 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080)={0x4}, 0xb) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/204, 0xcc}, 0x0) 07:44:44 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 07:44:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x0, 0x0, 0x80, 0x0, 0x101}, 0x98) 07:44:44 executing program 4: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, 0x0, 0x10}, 0x0) 07:44:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000480)={&(0x7f00000004c0)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000140)="19", 0x1}], 0x1, &(0x7f0000000400)=[@dstaddrv6={0x1c, 0x84, 0xa, @empty}], 0x1c}, 0x0) 07:44:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="100000008400000008000000200000001c000000840000000a000000ff020000000000000000000000000001100000008400000008f0ff0009000000100000008400000009000000e0000001100000008400000009000000ac1400aa1400000084000000010000000000950082ff05001400000084000000010000000000010004000300100000008400000008"], 0x94}, 0x0) 07:44:44 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_int(r0, 0x0, 0x4, 0x0, &(0x7f0000000080)) 07:44:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff1d}, 0x60080) 07:44:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 152.722520][ T4320] loop5: detected capacity change from 0 to 264192 [ 152.729697][ T4320] FAT-fs (loop5): bogus number of FAT sectors [ 152.735776][ T4320] FAT-fs (loop5): Can't find a valid FAT filesystem [ 152.745719][ C0] sd 0:0:1:0: tag#3778 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 152.755581][ C0] sd 0:0:1:0: tag#3778 CDB: opcode=0xe5 (vendor) [ 152.761953][ C0] sd 0:0:1:0: tag#3778 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 152.770964][ C0] sd 0:0:1:0: tag#3778 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 152.780009][ C0] sd 0:0:1:0: tag#3778 CDB[20]: ba 07:44:45 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:45 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f00000012c0), 0x8) 07:44:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:45 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) 07:44:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000000)=' ', 0x1, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 07:44:45 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000001c0), &(0x7f0000000280)=0x98) 07:44:45 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000013c0), &(0x7f0000001480)=0x98) 07:44:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000000)="90", 0x1, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) sendto(r0, &(0x7f0000000180)="a3", 0x1, 0x20188, 0x0, 0x0) 07:44:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:45 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000100)={0x1c, 0x1c, 0x1}, 0x1c) 07:44:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), &(0x7f0000000040)=0xc) 07:44:45 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000001540), &(0x7f0000001580)=0x20) [ 153.693663][ T4347] loop5: detected capacity change from 0 to 264192 [ 153.706818][ C1] sd 0:0:1:0: tag#3783 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 153.716676][ C1] sd 0:0:1:0: tag#3783 CDB: opcode=0xe5 (vendor) [ 153.723004][ C1] sd 0:0:1:0: tag#3783 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 153.732047][ C1] sd 0:0:1:0: tag#3783 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 153.741193][ C1] sd 0:0:1:0: tag#3783 CDB[20]: ba 07:44:46 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000008c0), &(0x7f0000000900)=0xb) 07:44:46 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind(r0, &(0x7f0000000240)=@in={0x10, 0x2}, 0x10) 07:44:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x9, &(0x7f0000000040)={@loopback}, &(0x7f0000000080)=0xc) 07:44:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000000)=0x9, 0x4) 07:44:46 executing program 3: getresgid(0x0, 0x0, &(0x7f0000000080)) 07:44:46 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000080), &(0x7f0000001700)=0x4) 07:44:46 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@dstaddrv4={0x10}, @authinfo={0x10}], 0x20}, 0x0) 07:44:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 07:44:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000140), &(0x7f0000000200)=0x4) [ 154.794300][ T4378] loop5: detected capacity change from 0 to 264192 [ 154.802961][ C0] sd 0:0:1:0: tag#3784 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 154.812827][ C0] sd 0:0:1:0: tag#3784 CDB: opcode=0xe5 (vendor) [ 154.819177][ C0] sd 0:0:1:0: tag#3784 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 154.828270][ C0] sd 0:0:1:0: tag#3784 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 154.837383][ C0] sd 0:0:1:0: tag#3784 CDB[20]: ba 07:44:47 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={r3}, &(0x7f0000000140)=0x14) 07:44:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) dup2(r1, r0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000000), &(0x7f0000000140)=0xc) 07:44:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) 07:44:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000000)="e7", 0x1, 0x20189, &(0x7f0000000080)={0x10, 0x2}, 0x10) 07:44:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000100)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0xc}, 0xc) 07:44:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x9, 0x80000000, 0x3}, 0x10) 07:44:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x30a}, 0x98) 07:44:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000012c0)={r3, 0x0, 0x1, 'P'}, 0x9) 07:44:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000c00)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000840)=[@sndrcv={0x2c}], 0x2c}, 0x0) [ 155.845568][ T4407] loop5: detected capacity change from 0 to 264192 [ 155.854176][ C0] sd 0:0:1:0: tag#3785 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 155.864133][ C0] sd 0:0:1:0: tag#3785 CDB: opcode=0xe5 (vendor) [ 155.870501][ C0] sd 0:0:1:0: tag#3785 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 155.879535][ C0] sd 0:0:1:0: tag#3785 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 155.888576][ C0] sd 0:0:1:0: tag#3785 CDB[20]: ba 07:44:48 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x23, &(0x7f0000001380), &(0x7f0000001440)=0x90) 07:44:48 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 07:44:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f00000013c0), &(0x7f0000001400)=0x8) 07:44:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f0000000100), &(0x7f0000000140)=0x18) 07:44:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r0, r1) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000300)=ANY=[], 0x8e) sendto$inet(r0, &(0x7f0000000000)="e7", 0x1, 0x20189, &(0x7f0000000080)={0x10, 0x2}, 0x10) 07:44:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:48 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x903, &(0x7f0000000140), 0x8) 07:44:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0xff}, 0x98) 07:44:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000000), &(0x7f0000000040)=0x8) 07:44:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000040), 0x8) [ 156.924218][ T4437] loop5: detected capacity change from 0 to 264192 [ 156.935387][ C0] sd 0:0:1:0: tag#3786 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 156.945243][ C0] sd 0:0:1:0: tag#3786 CDB: opcode=0xe5 (vendor) [ 156.951589][ C0] sd 0:0:1:0: tag#3786 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 156.960607][ C0] sd 0:0:1:0: tag#3786 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 156.969615][ C0] sd 0:0:1:0: tag#3786 CDB[20]: ba 07:44:49 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="02"], 0x57) 07:44:49 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000180)={0x0, 0x1}, 0x8) 07:44:49 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x104, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000003a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)=[@sndrcv={0x2c}], 0x2c}, 0x0) 07:44:49 executing program 3: getresgid(0x0, &(0x7f0000000040), &(0x7f0000000080)) 07:44:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f00000000c0)='./file0\x00', 0x0) 07:44:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x1) 07:44:49 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 07:44:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 07:44:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 07:44:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 157.894183][ T4466] loop5: detected capacity change from 0 to 264192 [ 157.906763][ C0] sd 0:0:1:0: tag#3787 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 157.916639][ C0] sd 0:0:1:0: tag#3787 CDB: opcode=0xe5 (vendor) [ 157.922997][ C0] sd 0:0:1:0: tag#3787 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 157.932128][ C0] sd 0:0:1:0: tag#3787 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 157.941225][ C0] sd 0:0:1:0: tag#3787 CDB[20]: ba 07:44:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000000)="90", 0x1, 0x20100, &(0x7f0000000100)={0x10, 0x2}, 0x10) sendto(r0, &(0x7f0000000180)="a3", 0x1, 0x0, 0x0, 0x0) 07:44:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x202, 0x0, 0x7f}, 0x98) 07:44:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000), 0x84) 07:44:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f00000023c0), 0xb6) 07:44:50 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000200)="12", 0x1, 0x0, &(0x7f0000000240)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 07:44:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r0, r1) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB=' '], 0x8e) sendto$inet(r0, &(0x7f0000000000)="e7", 0x1, 0x20189, &(0x7f0000000080)={0x10, 0x2}, 0x10) 07:44:50 executing program 3: pipe2(0x0, 0x0) pipe2(&(0x7f00000002c0), 0x0) 07:44:50 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000640)=@un=@abs={0x8}, 0x8) 07:44:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x13, &(0x7f0000000140), 0x8) 07:44:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000400), &(0x7f0000000440)=0x8) 07:44:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x10, 0x2}, 0x10) 07:44:50 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0x101, &(0x7f0000000300), &(0x7f0000000200)=0x98) 07:44:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000012c0), 0x8) [ 158.827297][ T4481] cgroup: fork rejected by pids controller in /syz2 [ 158.914049][ T4603] loop5: detected capacity change from 0 to 264192 [ 158.924934][ C0] sd 0:0:1:0: tag#3792 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 158.934783][ C0] sd 0:0:1:0: tag#3792 CDB: opcode=0xe5 (vendor) [ 158.941131][ C0] sd 0:0:1:0: tag#3792 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 158.950179][ C0] sd 0:0:1:0: tag#3792 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 158.959273][ C0] sd 0:0:1:0: tag#3792 CDB[20]: ba 07:44:51 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(0x0, 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:51 executing program 1: socket$inet_sctp(0x2, 0x1, 0x84) r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x1203, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES64=r1], 0x3ef) 07:44:51 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) sendto(r0, &(0x7f0000000100)="9b", 0x1, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 07:44:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000040), &(0x7f0000000140)=0x98) 07:44:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, @in, 0x0, 0x2, 0x10}, 0x98) 07:44:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendto(r0, &(0x7f00000004c0)="1d", 0x1, 0x104, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000003a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)=[@sndrcv={0x2c}], 0x2c}, 0x0) 07:44:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000040), 0xc) 07:44:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockname(r0, 0x0, &(0x7f0000000140)) 07:44:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:51 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f00000049c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004880)}, 0x0) 07:44:51 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0x101, &(0x7f0000000300), &(0x7f0000000200)=0x98) [ 159.901833][ T4633] loop5: detected capacity change from 0 to 264192 [ 159.914605][ C1] sd 0:0:1:0: tag#3793 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 159.924464][ C1] sd 0:0:1:0: tag#3793 CDB: opcode=0xe5 (vendor) [ 159.930837][ C1] sd 0:0:1:0: tag#3793 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 159.939877][ C1] sd 0:0:1:0: tag#3793 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 07:44:51 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(0x0, 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:51 executing program 4: r0 = socket(0x2, 0x5, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000240), &(0x7f0000000300)=0x98) 07:44:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, 0x0, 0x0) 07:44:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x385}, 0x98) 07:44:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000340)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x1a, &(0x7f0000000280)={r3}, 0x8) 07:44:51 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 07:44:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r0, r1) sendmsg$unix(r2, &(0x7f0000001540)={&(0x7f00000000c0)=@abs={0x8}, 0x8, 0x0}, 0x0) [ 159.948909][ C1] sd 0:0:1:0: tag#3793 CDB[20]: ba 07:44:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x98) 07:44:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000080), &(0x7f0000000140)=0xb0) 07:44:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x6a00}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000003a00)={0x0, 0x0, 0x0}, 0x0) [ 160.050861][ T4659] loop5: detected capacity change from 0 to 264192 [ 160.065377][ C0] sd 0:0:1:0: tag#3794 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 160.075266][ C0] sd 0:0:1:0: tag#3794 CDB: opcode=0xe5 (vendor) [ 160.081627][ C0] sd 0:0:1:0: tag#3794 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 160.090759][ C0] sd 0:0:1:0: tag#3794 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 07:44:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 07:44:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000000180)=0x10) 07:44:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000180)={0x0, 0x2, "c5e9"}, &(0x7f0000000080)=0xa) 07:44:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080)={0x4}, 0xb) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/204, 0xcc}, 0x3) 07:44:52 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(0x0, 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) sendto(r1, &(0x7f0000001600)="c7", 0x1, 0x0, &(0x7f0000002600)=@in={0x10, 0x2}, 0x10) 07:44:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 160.099801][ C0] sd 0:0:1:0: tag#3794 CDB[20]: ba 07:44:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) sendto(r1, 0x0, 0x0, 0x0, &(0x7f0000002600)=@in={0x10, 0x2}, 0x10) shutdown(r1, 0x0) 07:44:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000040), 0x1) 07:44:52 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x1c, 0x1c}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 07:44:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000240)={0x0, 0x2, "16b0"}, &(0x7f0000000080)=0xa) 07:44:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:52 executing program 1: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x6) 07:44:52 executing program 3: open$dir(&(0x7f0000001380)='./file0\x00', 0x200, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 07:44:52 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(r0, 0x2000747b) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(r0, 0x80087467, &(0x7f0000000000)={0x1, 0xff52, 0x401, 0x7a5}) [ 160.161976][ T4680] loop5: detected capacity change from 0 to 264192 [ 160.191061][ T24] audit: type=1400 audit(1641109492.162:225): avc: denied { shutdown } for pid=4685 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 07:44:52 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 07:44:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:52 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:52 executing program 3: r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20180, 0x0, 0x0) 07:44:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f00000004c0)=[{&(0x7f00000000c0)="c6", 0x1}], 0x1, &(0x7f0000000280)=[@dstaddrv4={0x10, 0x84, 0x9, @broadcast}], 0x10}, 0x0) 07:44:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000003a00)={0x0, 0x0, &(0x7f0000003900)=[{&(0x7f00000024c0)='o', 0x1}], 0x1, &(0x7f0000003980)=[@sndrcv={0x2c}], 0x2c}, 0x0) 07:44:52 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0xd94, 0x0, 0xffffffffffffffff}) 07:44:52 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @random="dc008fae94e5", @val, {@ipv6}}, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4) [ 160.263535][ C1] sd 0:0:1:0: tag#3795 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 160.273437][ C1] sd 0:0:1:0: tag#3795 CDB: opcode=0xe5 (vendor) [ 160.279808][ C1] sd 0:0:1:0: tag#3795 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 160.288859][ C1] sd 0:0:1:0: tag#3795 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 160.297921][ C1] sd 0:0:1:0: tag#3795 CDB[20]: ba 07:44:52 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0x69, 0x0, 0x0) 07:44:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) shutdown(r0, 0x2) 07:44:52 executing program 3: symlinkat(&(0x7f0000000040)='./file\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') open$dir(&(0x7f0000000100)='./file0\x00', 0x200, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 07:44:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 07:44:52 executing program 4: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00') [ 160.363102][ T4718] loop5: detected capacity change from 0 to 264192 [ 160.396083][ C0] sd 0:0:1:0: tag#3796 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 160.405961][ C0] sd 0:0:1:0: tag#3796 CDB: opcode=0xe5 (vendor) 07:44:52 executing program 0: mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 07:44:52 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 07:44:52 executing program 3: r0 = socket(0x1e, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendto(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)=@in={0x2, 0x2}, 0xc) 07:44:52 executing program 1: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 07:44:52 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) 07:44:52 executing program 4: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) [ 160.412330][ C0] sd 0:0:1:0: tag#3796 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 160.421372][ C0] sd 0:0:1:0: tag#3796 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 160.430441][ C0] sd 0:0:1:0: tag#3796 CDB[20]: ba 07:44:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) 07:44:52 executing program 3: r0 = socket(0x2, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000200)={0x18, 0x2}, 0xc) 07:44:52 executing program 4: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x3000)=nil, 0x0) 07:44:52 executing program 0: r0 = socket(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="99025bad1a"], 0x10) 07:44:52 executing program 0: r0 = socket(0x1e, 0x3, 0x0) getpeername$inet(r0, 0x0, &(0x7f0000000080)) 07:44:52 executing program 4: linkat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) [ 160.481850][ C1] sd 0:0:1:0: tag#3797 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 160.492343][ C1] sd 0:0:1:0: tag#3797 CDB: opcode=0xe5 (vendor) [ 160.498729][ C1] sd 0:0:1:0: tag#3797 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 160.507775][ C1] sd 0:0:1:0: tag#3797 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 160.516806][ C1] sd 0:0:1:0: tag#3797 CDB[20]: ba 07:44:52 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x12f}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 07:44:52 executing program 0: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 07:44:52 executing program 3: openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000020c0)='ns/pid_for_children\x00') 07:44:52 executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x200042}, 0x10) dup3(r1, r0, 0x0) 07:44:52 executing program 1: r0 = socket(0x26, 0x5, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x19, &(0x7f0000000000), 0x4) 07:44:52 executing program 0: r0 = socket(0x26, 0x5, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x12, &(0x7f0000000000), 0x4) [ 160.552359][ T24] audit: type=1400 audit(1641109492.522:226): avc: denied { execute } for pid=4746 comm="syz-executor.1" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 07:44:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:52 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:52 executing program 2: setuid(0xffffffffffffffff) socket(0x1e, 0x3, 0x0) [ 160.626887][ T24] audit: type=1400 audit(1641109492.572:227): avc: denied { setopt } for pid=4761 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 160.662306][ T4780] loop1: detected capacity change from 0 to 264192 [ 160.697957][ T4787] loop5: detected capacity change from 0 to 264192 [ 160.727607][ C1] sd 0:0:1:0: tag#3798 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 160.737464][ C1] sd 0:0:1:0: tag#3798 CDB: opcode=0xe5 (vendor) [ 160.743823][ C1] sd 0:0:1:0: tag#3798 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 160.753060][ C1] sd 0:0:1:0: tag#3798 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 160.754378][ C0] sd 0:0:1:0: tag#3799 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 160.762107][ C1] sd 0:0:1:0: tag#3798 CDB[20]: ba [ 160.771909][ C0] sd 0:0:1:0: tag#3799 CDB: opcode=0xe5 (vendor) [ 160.771927][ C0] sd 0:0:1:0: tag#3799 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 07:44:52 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00') 07:44:52 executing program 2: munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 07:44:52 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:52 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x811, r0, 0x0) 07:44:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 160.792350][ C0] sd 0:0:1:0: tag#3799 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 160.801393][ C0] sd 0:0:1:0: tag#3799 CDB[20]: ba 07:44:52 executing program 0: open$dir(&(0x7f0000001380)='./file0\x00', 0x200, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 07:44:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 07:44:52 executing program 0: fchownat(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xe) 07:44:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) [ 160.912874][ T4801] loop1: detected capacity change from 0 to 264192 [ 160.929317][ T4803] loop5: detected capacity change from 0 to 264192 [ 160.942069][ C0] sd 0:0:1:0: tag#3800 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 160.943034][ C1] sd 0:0:1:0: tag#3801 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 160.951998][ C0] sd 0:0:1:0: tag#3800 CDB: opcode=0xe5 (vendor) [ 160.961807][ C1] sd 0:0:1:0: tag#3801 CDB: opcode=0xe5 (vendor) [ 160.968123][ C0] sd 0:0:1:0: tag#3800 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 160.974425][ C1] sd 0:0:1:0: tag#3801 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 160.974447][ C1] sd 0:0:1:0: tag#3801 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 160.983456][ C0] sd 0:0:1:0: tag#3800 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 07:44:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:53 executing program 2: open$dir(&(0x7f0000001380)='./file0\x00', 0x200, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 07:44:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000080)='./file0\x00') 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 07:44:53 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup2(r0, r0) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 07:44:53 executing program 2: sendmsg(0xffffffffffffff9c, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) 07:44:53 executing program 0: open$dir(&(0x7f0000001380)='./file0\x00', 0x200, 0x0) [ 160.992462][ C1] sd 0:0:1:0: tag#3801 CDB[20]: ba [ 161.001460][ C0] sd 0:0:1:0: tag#3800 CDB[20]: ba 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001ac0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0) [ 161.128476][ T4843] loop5: detected capacity change from 0 to 264192 [ 161.150005][ C0] sd 0:0:1:0: tag#3802 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 161.159958][ C0] sd 0:0:1:0: tag#3802 CDB: opcode=0xe5 (vendor) [ 161.166306][ C0] sd 0:0:1:0: tag#3802 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 07:44:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002680)=[{&(0x7f00000000c0)="45869800b21ccbf11b496b2610379c4a4f8f3cc4f7fccaaaee77c0b2d5785da301add5a9f4d19d59af2d1faa9e50634b19c2e10a50294384f19de20df73f6ec7cc656c0e877cf15b34122d932277ce99bfd8ed65bbff9fa3ebfdcee93589bf7ca9f98fe6cd845b84e7c49a5d2f6bf22c08e668461195b89232fc510c01905f13", 0x80}], 0x1, &(0x7f0000002740)=[@cred], 0x20, 0x410}, 0x2) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) readv(r0, &(0x7f00000004c0)=[{0x0}], 0x1) 07:44:53 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) 07:44:53 executing program 2: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 161.175351][ C0] sd 0:0:1:0: tag#3802 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 161.184418][ C0] sd 0:0:1:0: tag#3802 CDB[20]: ba 07:44:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 07:44:53 executing program 1: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000540), 0x8) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 0: symlinkat(&(0x7f0000000040)='./file\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') open$dir(&(0x7f0000000100)='./file0\x00', 0x200, 0x0) [ 161.242589][ T4864] loop5: detected capacity change from 0 to 264192 07:44:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:53 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 07:44:53 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 0: poll(&(0x7f0000000400)=[{}], 0x1, 0x3) 07:44:53 executing program 1: socketpair(0x0, 0x0, 0x1, 0x0) 07:44:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 0: r0 = socket(0x1e, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) connect(r2, &(0x7f0000000040)=@in, 0xc) 07:44:53 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x0, 0xffffffffffffffff}}) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:53 executing program 2: fcntl$lock(0xffffffffffffff9c, 0x15, 0x0) 07:44:53 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000001140)={0x2, 0x2}, 0xc) 07:44:53 executing program 0: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 2: socket(0x1f, 0x5, 0x0) [ 161.385202][ T4901] loop5: detected capacity change from 0 to 264192 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 07:44:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt(r0, 0xffff, 0x4, 0x0, 0x0) 07:44:53 executing program 2: shmget(0x0, 0x2000, 0x331, &(0x7f0000ffb000/0x2000)=nil) 07:44:53 executing program 1: lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:53 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) getsockname$unix(r0, &(0x7f0000001780)=@abs, &(0x7f00000017c0)=0x8) 07:44:53 executing program 1: setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0x69, &(0x7f0000000500)={{0x18}, {0x18, 0x2}}, 0x3c) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 2: msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0xffffffffffffffff}}) [ 161.475037][ T4927] loop5: detected capacity change from 0 to 264192 07:44:53 executing program 0: socketpair(0x23, 0x0, 0x1, 0x0) 07:44:53 executing program 2: munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 0: semctl$GETZCNT(0xffffffffffffffff, 0x0, 0x7, 0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 1: close(0xffffffffffffffff) dup(0xffffffffffffffff) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 161.579150][ T4947] loop5: detected capacity change from 0 to 264192 07:44:53 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 07:44:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:53 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000200)={{0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff}) 07:44:53 executing program 2: socket$inet6(0x18, 0x10000000, 0x3f) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 1: poll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x8}], 0x1, 0x3) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 0: bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0xa) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:53 executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000000440)=[{0x0}, {&(0x7f00000000c0)="bb", 0x1}], 0x2) 07:44:53 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 0: r0 = msgget(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000340)) 07:44:53 executing program 2: r0 = shmget(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff}) 07:44:53 executing program 1: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/118) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) pwritev(r0, &(0x7f0000000400)=[{0x0}], 0x1, 0x0, 0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 161.748437][ T5001] loop5: detected capacity change from 0 to 264192 07:44:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:53 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000004040)={0x0, 0x0, 0x0}, 0x0) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa) 07:44:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0xfffffd0d, 0x0, 0x0, 0x0) 07:44:53 executing program 2: pipe2(0x0, 0x800004) 07:44:53 executing program 1: setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)='%', 0x1) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 0: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffff9c, 0x0) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x10, 0x0, 0x0) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 161.867033][ T5039] loop5: detected capacity change from 0 to 264192 07:44:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:53 executing program 1: socket$inet(0x2, 0x0, 0x4) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@fwd={0x4, 0x0, 0x0, 0x12}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000300)=""/235, 0x2a, 0xeb, 0x1}, 0x20) 07:44:53 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x8, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc110, 0x8001, 0x0, 0x3, 0x0, 0x0, 0x7}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x5, 0x0, 0x7, 0x5, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x1, @perf_config_ext={0x8, 0x3f}, 0x0, 0x5, 0x9, 0x1, 0xb38, 0xffff, 0x0, 0x0, 0xfffffffd, 0x0, 0x1}, r2, 0xd, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = openat$cgroup(r4, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000300)='blkio.bfq.io_merged\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x10410, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x5}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_procs(r3, &(0x7f0000000400)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x2800, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x10001, 0x2}, 0x10672, 0xc9, 0xe2, 0x2, 0x4000000000000, 0x7, 0x68db, 0x0, 0x5, 0x0, 0x80000007fff}, r2, 0xd, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='(\x96w&\'\'{)/:/&/\\)&f\\$\')/#\\.\x00') bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000004c0), 0xfffffffffffffd66) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305829, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 07:44:53 executing program 0: bpf$MAP_CREATE(0x1e, &(0x7f00000021c0), 0x48) 07:44:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 1: msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}}) [ 162.046526][ T5084] loop5: detected capacity change from 0 to 264192 07:44:54 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 0: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 07:44:54 executing program 1: r0 = shmget(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)=""/53) 07:44:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001680)={0x0, &(0x7f0000001580)=""/247, 0x0, 0xf7, 0x20}, 0x20) 07:44:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='cgroup.stat\x00', 0x0, 0x0) 07:44:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0xc0189436, 0x0) 07:44:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)) 07:44:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x894c, 0x0) 07:44:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@fwd={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000300)=""/235, 0x2a, 0xeb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x10, &(0x7f0000000100)={&(0x7f0000000080)=""/81, 0x51}}, 0x10) 07:44:54 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=@base={0x5}, 0x48) 07:44:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 162.282429][ T5114] loop5: detected capacity change from 0 to 264192 07:44:54 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={0x0, 0x0, 0x18}, 0x10) 07:44:54 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000700)='./file0\x00') 07:44:54 executing program 2: r0 = perf_event_open(&(0x7f0000000380)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 07:44:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003940)={0x12, 0x1, &(0x7f0000003680)=@raw=[@call], &(0x7f00000036c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:44:54 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) [ 162.346773][ T24] audit: type=1400 audit(1641109494.312:228): avc: denied { map_create } for pid=5120 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 07:44:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f000000fc80)=@base={0x10, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 07:44:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89a2, &(0x7f0000000040)={'veth0_virt_wifi\x00', @dev}) [ 162.416733][ T24] audit: type=1400 audit(1641109494.372:229): avc: denied { cpu } for pid=5130 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 07:44:54 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89a1, &(0x7f0000000040)={r1}) 07:44:54 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='syzkaller\x00') 07:44:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8933, &(0x7f0000000040)={'veth0_virt_wifi\x00', @dev}) [ 162.501370][ T5145] loop5: detected capacity change from 0 to 264192 07:44:54 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 162.569672][ T24] audit: type=1400 audit(1641109494.542:230): avc: denied { write } for pid=5151 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 162.589389][ T24] audit: type=1400 audit(1641109494.542:231): avc: denied { create } for pid=5149 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 07:44:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x3, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x61}}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:44:54 executing program 1: perf_event_open$cgroup(&(0x7f00000000c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:44:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0/file0\x00'}, 0x10) [ 162.616975][ T24] audit: type=1400 audit(1641109494.582:232): avc: denied { ioctl } for pid=5149 comm="syz-executor.1" path="socket:[25888]" dev="sockfs" ino=25888 ioctlcmd=0x89a1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 07:44:54 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xfffffffffffffffc}, {0x0}], 0x9}, 0x0) 07:44:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x7, &(0x7f00000005c0)=@framed={{}, [@cb_func, @cb_func]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:44:54 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x3, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x6}}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:44:54 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 162.711250][ T5171] loop5: detected capacity change from 0 to 264192 07:44:54 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) 07:44:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f0000003940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:44:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000005dc0), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x40049409, 0x0) 07:44:54 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000001100)='./file0/file0\x00', &(0x7f0000001140), 0x0, &(0x7f0000001180)={[{@mode={'mode', 0x3d, 0xfffffffffffffffc}}, {}, {}, {@mode={'mode', 0x3d, 0x100}}], [{@context={'context', 0x3d, 'unconfined_u'}}]}) [ 162.850007][ T5195] bpf: Bad value for 'mode' 07:44:54 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:54 executing program 2: socketpair(0xa, 0x3, 0x0, &(0x7f00000020c0)) 07:44:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000003280)=@base={0x16, 0x0, 0xeb, 0x3}, 0x48) 07:44:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002900)={&(0x7f0000002780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4}}]}}, &(0x7f0000002840)=""/155, 0x32, 0x9b, 0x1}, 0x20) 07:44:54 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 162.889227][ T5199] loop5: detected capacity change from 0 to 264192 07:44:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x401c5820, 0x0) 07:44:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$unix(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)='D', 0x1}], 0x1}, 0x0) 07:44:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:54 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map=0x1, 0xffffffffffffffff, 0x5}, 0x10) [ 162.955754][ T24] audit: type=1400 audit(1641109494.922:233): avc: denied { map_read map_write } for pid=5200 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 07:44:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 163.017636][ T24] audit: type=1400 audit(1641109494.982:234): avc: denied { read } for pid=5218 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 07:44:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x5}]}}, &(0x7f0000000240)=""/152, 0x26, 0x98, 0x1}, 0x20) 07:44:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@const]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/152, 0x27, 0x98, 0x1}, 0x20) 07:44:55 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 163.129818][ T5231] loop5: detected capacity change from 0 to 264192 07:44:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 163.310015][ T5252] loop5: detected capacity change from 0 to 264192 07:44:55 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file1\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x141) r0 = socket$kcm(0x29, 0x1, 0x0) recvmsg$kcm(r0, &(0x7f0000000940)={&(0x7f0000000680)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000700)=""/87, 0x57}, {&(0x7f0000000780)=""/155, 0x9b}], 0x2, &(0x7f0000000880)=""/135, 0x87}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000b80)=@tipc=@name, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000c00)=""/242, 0xf2}, {&(0x7f0000000d00)=""/147, 0x93}, {&(0x7f0000000dc0)=""/254, 0xfe}, {&(0x7f0000000ec0)=""/21, 0x15}, {&(0x7f0000000f00)=""/180, 0xb4}], 0x5, &(0x7f0000001040)=""/66, 0x42}, 0x10102) mount$bpf(0x0, &(0x7f0000001100)='./file0/file0\x00', &(0x7f0000001140), 0x10, &(0x7f0000001180)={[{@mode={'mode', 0x3d, 0xfffffffffffffffc}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode', 0x3d, 0x100000000}}, {@mode={'mode', 0x3d, 0xffffffff}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x101}}, {@mode={'mode', 0x3d, 0x200}}, {@mode={'mode', 0x3d, 0x401}}, {@mode={'mode', 0x3d, 0x100}}], [{@fsuuid={'fsuuid', 0x3d, {[0x34, 0x34, 0x62, 0x38, 0x34, 0x31, 0x33, 0x30], 0x2d, [0x0, 0x32, 0x39, 0x63], 0x2d, [0x34, 0x64, 0x33, 0x31], 0x2d, [0x34, 0x37, 0x30, 0x34], 0x2d, [0x36, 0x39, 0x31, 0x37, 0x61, 0x0, 0x61, 0x37]}}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@subj_type={'subj_type', 0x3d, '^#.'}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) 07:44:55 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x300}) 07:44:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:55 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)) 07:44:55 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:55 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x1, 0x0, [0x0]}) 07:44:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:55 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000000c0)=""/175, 0xaf}], 0x1}, 0x40010041) 07:44:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x9}]}]}}, &(0x7f00000000c0)=""/184, 0x2e, 0xb8, 0x1}, 0x20) 07:44:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 163.873719][ T5262] loop5: detected capacity change from 0 to 264192 [ 163.883596][ T5267] bpf: Bad value for 'mode' 07:44:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd5, 0xd5, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @volatile]}, {0x0, [0x0]}}, 0x0, 0xf3}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:55 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x4a0401, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000005dc0), 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000005dc0), 0x0, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000080)) 07:44:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:55 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 07:44:55 executing program 1: r0 = perf_event_open(&(0x7f0000000380)={0x8, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000000)='(@/!\x00') 07:44:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd5, 0xd5, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @volatile]}, {0x0, [0x0]}}, 0x0, 0xf3}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003940)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x47}]}, &(0x7f00000036c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:44:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8971, &(0x7f0000000040)={'veth0_virt_wifi\x00', @dev}) 07:44:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001f80)={&(0x7f00000009c0)=@in={0x2, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000001ec0)=[{0x28, 0x0, 0x0, "0d542943cbc701bd366bea4227c4273417"}], 0x28}, 0x0) 07:44:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd5, 0xd5, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @volatile]}, {0x0, [0x0]}}, 0x0, 0xf3}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6}, {0x6}]}, 0x10) 07:44:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 0: setrlimit(0x0, &(0x7f0000000140)={0x8, 0x401}) 07:44:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xcb}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6c}, 0xa, @in6=@private1}}, 0xe8) 07:44:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:56 executing program 0: clock_gettime(0x14c86025074b299d, 0x0) 07:44:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8940, &(0x7f0000000040)={'veth0_virt_wifi\x00', @dev}) 07:44:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfa, 0xfa, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @volatile]}}, 0x0, 0x116}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x20000000000000, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:44:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xcb}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 164.179801][ T5322] loop5: detected capacity change from 0 to 264192 07:44:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8e334, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='fdinfo/3\x00') 07:44:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfa, 0xfa, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @volatile]}}, 0x0, 0x116}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 1: syz_emit_ethernet(0x116, &(0x7f0000000080)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbbb8848"], 0x0) 07:44:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt(r0, 0x0, 0xb, &(0x7f0000000080)='4', 0x1) 07:44:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) 07:44:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xcb}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 164.361031][ T5350] loop5: detected capacity change from 0 to 264192 07:44:56 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:56 executing program 0: syz_emit_ethernet(0xca, 0x0, 0x0) 07:44:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfa, 0xfa, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @volatile]}}, 0x0, 0x116}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2d, 0x0, 0x0) 07:44:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40000023, 0x0, 0x0) 07:44:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 07:44:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd5, 0xd5, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @array, @volatile]}}, 0x0, 0xf2}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x4000) r0 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) shmdt(r0) 07:44:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001580)={&(0x7f0000000000)={0xa, 0x4e1f, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000014c0)=[@hoplimit={{0x14}}], 0x18}, 0x0) 07:44:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 164.560760][ T5379] loop5: detected capacity change from 0 to 264192 07:44:56 executing program 0: io_setup(0x284c, &(0x7f0000000040)=0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000080)=[{}], 0x0) 07:44:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd5, 0xd5, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @array, @volatile]}}, 0x0, 0xf2}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:56 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:56 executing program 1: syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffa000/0x6000)=nil, 0x7000) [ 164.740074][ T5391] loop5: detected capacity change from 0 to 264192 07:44:57 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x6000200d}) 07:44:57 executing program 1: syz_emit_ethernet(0xe, &(0x7f00000004c0)={@dev, @empty, @void, {@mpls_uc}}, 0x0) 07:44:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd5, 0xd5, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @array, @volatile]}}, 0x0, 0xf2}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0xfffffffffffffffc, 0x0) [ 165.316810][ T5394] loop5: detected capacity change from 0 to 264192 [ 165.329642][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 165.329653][ T24] audit: type=1400 audit(1641109497.302:238): avc: denied { block_suspend } for pid=5399 comm="syz-executor.2" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 07:44:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 165.377564][ C1] scsi_io_completion_action: 19 callbacks suppressed [ 165.384305][ C1] sd 0:0:1:0: tag#3784 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 165.394163][ C1] sd 0:0:1:0: tag#3784 CDB: opcode=0xe5 (vendor) [ 165.400505][ C1] sd 0:0:1:0: tag#3784 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 165.409546][ C1] sd 0:0:1:0: tag#3784 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 165.418615][ C1] sd 0:0:1:0: tag#3784 CDB[20]: ba 07:44:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 07:44:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f00000000c0)=0x100, 0x4) 07:44:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f0000001140)) 07:44:57 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:57 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)={0x0}) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x7}, 0x0, &(0x7f0000000100)={r0}) 07:44:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 07:44:57 executing program 0: io_setup(0xffff, &(0x7f0000000140)) accept4$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) [ 165.570757][ T5411] loop5: detected capacity change from 0 to 264192 07:44:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 165.627161][ T24] audit: type=1400 audit(1641109497.592:239): avc: denied { map } for pid=5427 comm="syz-executor.2" path="/dev/nvram" dev="devtmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 165.634097][ C1] sd 0:0:1:0: tag#3785 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 165.660840][ C1] sd 0:0:1:0: tag#3785 CDB: opcode=0xe5 (vendor) [ 165.667168][ C1] sd 0:0:1:0: tag#3785 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 07:44:57 executing program 1: io_setup(0xffff, &(0x7f0000000140)=0x0) io_destroy(r0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) 07:44:57 executing program 2: unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x200) 07:44:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 2: io_setup(0xffff, &(0x7f0000000140)) socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x2, &(0x7f0000000080)) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 165.676206][ C1] sd 0:0:1:0: tag#3785 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 165.685271][ C1] sd 0:0:1:0: tag#3785 CDB[20]: ba 07:44:57 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@local, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:44:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 0: ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 07:44:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x0) 07:44:57 executing program 1: shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x5000) r0 = shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x5000) shmdt(r0) 07:44:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:57 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) 07:44:57 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, r0, r1) [ 165.923119][ T5475] loop5: detected capacity change from 0 to 264192 [ 165.969350][ C1] sd 0:0:1:0: tag#3786 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 165.979229][ C1] sd 0:0:1:0: tag#3786 CDB: opcode=0xe5 (vendor) [ 165.985556][ C1] sd 0:0:1:0: tag#3786 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 165.994575][ C1] sd 0:0:1:0: tag#3786 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 166.003601][ C1] sd 0:0:1:0: tag#3786 CDB[20]: ba 07:44:58 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:58 executing program 2: select(0x40, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)) 07:44:58 executing program 1: syz_emit_ethernet(0xca, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaabbbbbbbbb3bbbb810011000800487a00b8006800007f1190780a"], 0x0) 07:44:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @broadcast}}}, 0x108) 07:44:58 executing program 1: syz_emit_ethernet(0x116, &(0x7f0000000080)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbbb88"], 0x0) 07:44:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f00000002c0)=@in={0x2, 0x4e24, @remote}, 0x80, 0x0}, 0x4) 07:44:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:58 executing program 0: add_key(&(0x7f0000000140)='keyring\x00', 0x0, &(0x7f00000001c0)='M', 0x1, 0xfffffffffffffffb) 07:44:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 166.220190][ T5509] loop5: detected capacity change from 0 to 264192 07:44:58 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) 07:44:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001e00)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000001ec0)=ANY=[], 0x110}}], 0x1, 0x20000000) sendmmsg$inet6(r0, &(0x7f0000002280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x58}}], 0x1, 0x0) 07:44:58 executing program 2: syslog(0x4, &(0x7f0000000140)=""/4096, 0x1000) 07:44:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40012023, 0x0, 0x0) 07:44:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:58 executing program 0: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 07:44:58 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, 0xee01}}]}) [ 166.448336][ T24] audit: type=1400 audit(1641109498.422:240): avc: denied { mount } for pid=5535 comm="syz-executor.2" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 166.449477][ T5539] loop5: detected capacity change from 0 to 264192 [ 166.496336][ T24] audit: type=1400 audit(1641109498.462:241): avc: denied { unmount } for pid=1829 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 07:44:58 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 166.691566][ T5543] loop5: detected capacity change from 0 to 264192 07:44:59 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, r0, r1) 07:44:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x3, 0x0, 0xf, 0x1, [{}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 07:44:59 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f00000002c0)={0x2, 0x4e22, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x88, 0x2}]}}}], 0x18}, 0x0) 07:44:59 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:44:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 0: clone(0x88021000, 0x0, 0x0, 0x0, 0x0) 07:44:59 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/module/processor', 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 07:44:59 executing program 1: setresuid(0xffffffffffffffff, 0xee00, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) [ 167.183408][ T5556] loop5: detected capacity change from 0 to 264192 07:44:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setuid(0xee00) connect(r0, &(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0xfffffffd}, 0x80) 07:44:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6611, 0x0) 07:44:59 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x2, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 167.226324][ C0] sd 0:0:1:0: tag#3787 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 167.236188][ C0] sd 0:0:1:0: tag#3787 CDB: opcode=0xe5 (vendor) [ 167.242548][ C0] sd 0:0:1:0: tag#3787 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 167.251612][ C0] sd 0:0:1:0: tag#3787 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 167.260657][ C0] sd 0:0:1:0: tag#3787 CDB[20]: ba 07:44:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 167.323856][ T24] audit: type=1400 audit(1641109499.292:242): avc: denied { connect } for pid=5580 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 07:44:59 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:44:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xb, 0x5}, {0x4}, {0x1}, {0x8, 0x4}]}]}}, &(0x7f0000000100)=""/204, 0x46, 0xcc, 0x1}, 0x20) 07:44:59 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 07:44:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x2, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x2}}, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:44:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a80)={&(0x7f0000001940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x10}, {0x0, 0x3}]}]}}, &(0x7f00000019c0)=""/152, 0x36, 0x98, 0x1}, 0x20) 07:44:59 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x9, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:44:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000002400)="bb", &(0x7f0000002500)="8e"}, 0x48) 07:44:59 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000300), 0x48) 07:44:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 167.541052][ T5613] loop5: detected capacity change from 0 to 264192 [ 167.552573][ C1] sd 0:0:1:0: tag#3788 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 167.562428][ C1] sd 0:0:1:0: tag#3788 CDB: opcode=0xe5 (vendor) [ 167.568780][ C1] sd 0:0:1:0: tag#3788 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 167.577813][ C1] sd 0:0:1:0: tag#3788 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 167.586811][ C1] sd 0:0:1:0: tag#3788 CDB[20]: ba 07:44:59 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:44:59 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}, 0x21) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) 07:44:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x0, 0x10001}]}]}}, &(0x7f0000000100)=""/204, 0x32, 0xcc, 0x8}, 0x20) 07:44:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000240)=""/204, 0x32, 0xcc, 0x1}, 0x20) 07:44:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f000000d9c0), 0x8) r1 = openat$cgroup_ro(r0, &(0x7f000000e140)='cgroup.freeze\x00', 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f000000e180)={0xffffffffffffffff, 0xfb, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000e200)={0x18, 0x8, &(0x7f000000e000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0x10}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f000000e040)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000e0c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f000000e100)={0x3, 0x6, 0x8, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f000000e1c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2]}, 0x80) 07:44:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x76d, 0xf5, &(0x7f0000000080)=""/245, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:44:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@var={0x2, 0x0, 0x0, 0xe, 0x5}, @volatile]}, {0x0, [0x0, 0x71]}}, &(0x7f0000000dc0)=""/225, 0x38, 0xe1, 0x1}, 0x20) 07:44:59 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[@rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @cred={{0x1c}}], 0x50}, 0x2042) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x21) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001b80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) [ 167.675589][ T5618] BPF: (anon) type_id=0 bits_offset=65537 [ 167.681457][ T5618] BPF: [ 167.684268][ T5618] BPF:Invalid type_id [ 167.688264][ T5618] BPF: [ 167.688264][ T5618] 07:44:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa1, 0xa1, 0x3, [@int, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xbf}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 167.809437][ T5641] loop5: detected capacity change from 0 to 264192 [ 167.821760][ C0] sd 0:0:1:0: tag#3789 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 167.831966][ C0] sd 0:0:1:0: tag#3789 CDB: opcode=0xe5 (vendor) [ 167.838319][ C0] sd 0:0:1:0: tag#3789 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 167.847347][ C0] sd 0:0:1:0: tag#3789 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 167.856363][ C0] sd 0:0:1:0: tag#3789 CDB[20]: ba 07:44:59 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x0, &(0x7f0000000180)="708d08e7601608cc6b0ac66f02111d76b0972284f7bc56aa89f41022b1a4d72e449ee10c0f2152f888e2c8889c") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:44:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000e140)='cgroup.freeze\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f000000e180)={0xffffffffffffffff, 0xfb, 0x8}, 0xc) 07:44:59 executing program 1: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mkdir(&(0x7f0000001c00)='./file0\x00', 0x0) 07:44:59 executing program 0: bpf$BPF_GET_BTF_INFO(0x23, &(0x7f0000000140)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0}}, 0x10) 07:44:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa1, 0xa1, 0x3, [@int, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xbf}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 1: perf_event_open(&(0x7f0000000100)={0x8, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:44:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000e200)={0x18, 0x3, &(0x7f000000e000)=@framed, &(0x7f000000e040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f000000e100), 0x10}, 0x80) 07:44:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa1, 0xa1, 0x3, [@int, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xbf}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000013c0)='./cgroup/syz0\x00', 0x200002, 0x0) 07:44:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:44:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4}]}}, &(0x7f0000000100)=""/204, 0x26, 0xcc, 0x1}, 0x20) [ 168.060201][ T5669] loop5: detected capacity change from 0 to 264192 [ 168.072048][ C1] sd 0:0:1:0: tag#3790 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 168.081933][ C1] sd 0:0:1:0: tag#3790 CDB: opcode=0xe5 (vendor) [ 168.088384][ C1] sd 0:0:1:0: tag#3790 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 168.097678][ C1] sd 0:0:1:0: tag#3790 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 168.106709][ C1] sd 0:0:1:0: tag#3790 CDB[20]: ba 07:45:00 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) 07:45:00 executing program 2: socketpair(0x2, 0x1, 0x4, &(0x7f0000004200)) 07:45:00 executing program 1: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x1}}, 0x0) setitimer(0x0, &(0x7f0000000040)={{}, {0x3}}, &(0x7f0000000080)) 07:45:00 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x10a}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:00 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0xe, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x80, 0x7}]}}, &(0x7f0000000500)=""/251, 0x2a, 0xfb, 0x1}, 0x20) 07:45:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000004c0)="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", 0x20001381}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x42) 07:45:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x10a}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x16, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:00 executing program 2: socketpair(0x2c, 0x3, 0x3, &(0x7f0000000540)) [ 168.219593][ T24] audit: type=1400 audit(1641109500.192:243): avc: denied { prog_run } for pid=5684 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 168.289199][ T24] audit: type=1400 audit(1641109500.262:244): avc: denied { create } for pid=5697 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 168.323873][ T5705] loop5: detected capacity change from 0 to 264192 [ 168.336107][ C1] sd 0:0:1:0: tag#3791 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 168.345971][ C1] sd 0:0:1:0: tag#3791 CDB: opcode=0xe5 (vendor) [ 168.352316][ C1] sd 0:0:1:0: tag#3791 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 168.361354][ C1] sd 0:0:1:0: tag#3791 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 168.370393][ C1] sd 0:0:1:0: tag#3791 CDB[20]: ba 07:45:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000e200)={0x0, 0x3, &(0x7f000000e000)=@framed, &(0x7f000000e040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:00 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_ext={0x1c, 0x4, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 07:45:00 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r2, 0x0, 0x8400fffffffa) 07:45:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x10a}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000140)}, 0x0) mkdir(&(0x7f0000001680)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000001480)='./file0\x00', &(0x7f0000001540), 0x1000800, &(0x7f0000001580)={[{@mode={'mode', 0x3d, 0x4}}, {}, {@mode={'mode', 0x3d, 0x80000001}}, {@mode={'mode', 0x3d, 0x4}}], [{@hash}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}]}) [ 168.512468][ T24] audit: type=1400 audit(1641109500.482:245): avc: denied { mount } for pid=5719 comm="syz-executor.2" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 168.535921][ T24] audit: type=1400 audit(1641109500.502:246): avc: denied { unmount } for pid=1829 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 168.569313][ T5723] loop5: detected capacity change from 0 to 264192 07:45:01 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002740)={0xffffffffffffffff}) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000440)={'wg1'}, 0x6) 07:45:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) 07:45:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 2: socketpair(0x2, 0x1, 0x2, &(0x7f0000000780)) 07:45:01 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r2, 0x0, 0x8400fffffffa) 07:45:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000e200)={0x18, 0x3, &(0x7f000000e000)=@framed, &(0x7f000000e040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 2: bpf$MAP_CREATE(0x10, &(0x7f0000000300), 0x48) 07:45:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2600, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000100)=""/204, 0x26, 0xcc, 0x1}, 0x20) [ 169.110515][ T5733] loop5: detected capacity change from 0 to 264192 07:45:01 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') close(r0) 07:45:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000004c0)="d8", 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000000100)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 07:45:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r2, 0x0, 0x8400fffffffa) 07:45:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000340)) 07:45:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001780)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee00}}}], 0x20000560}, 0x0) 07:45:01 executing program 2: mkdir(&(0x7f0000001680)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000001480)='./file0\x00', &(0x7f0000001540), 0x0, &(0x7f0000001580)) 07:45:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 0: socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000e200)={0x18, 0x8, &(0x7f000000e000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0x10}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f000000e040)='GPL\x00', 0x3, 0xe, &(0x7f000000e080)=""/14, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000e0c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f000000e100)={0x3}, 0x10}, 0x80) 07:45:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:01 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x11}, 0x10) 07:45:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000001d80)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001c80)="a5", 0x1}], 0x1, &(0x7f0000003700)=ANY=[@ANYBLOB="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"], 0x400}, 0x0) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 07:45:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001e00)={0xffffffffffffffff}) r1 = getpid() r2 = getpid() sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee01}}}], 0x40}, 0x0) [ 170.079190][ T5797] loop5: detected capacity change from 0 to 264192 07:45:02 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:02 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x2, 0x3, &(0x7f0000000040)=@framed={{0x61}}, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 2: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 07:45:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000100)=""/204, 0x26, 0xcc, 0x8}, 0x20) 07:45:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x9776, [{0x0, 0x3, 0x10001}, {0x0, 0x2}]}]}}, &(0x7f0000000100)=""/204, 0x3e, 0xcc, 0x1}, 0x20) 07:45:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000004c0)="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", 0xec1}], 0x300}, 0x0) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000000100)=""/159, 0x9f}, {&(0x7f00000001c0)=""/183, 0xb7}, {0x0}, {&(0x7f0000001540)=""/4096, 0x1000}, {0x0}, {&(0x7f00000002c0)=""/186, 0xba}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 07:45:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x24041055) [ 170.308997][ T5826] loop5: detected capacity change from 0 to 264192 07:45:02 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:02 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x2, 0x3, &(0x7f0000000040)=@framed={{}, [], {0x95, 0x72}}, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:02 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x2, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x122}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:45:02 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000001d80)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001c80)="a5", 0x1}], 0x1, &(0x7f0000003700)=ANY=[@ANYBLOB="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"], 0x400}, 0x0) recvmsg(r0, &(0x7f00000034c0)={0x0, 0x0, 0x0}, 0x0) 07:45:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc6, 0xc6, 0x2, [@int, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0xe2}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:45:02 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x12, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001840)=""/158, 0x9e}, {&(0x7f0000001900)=""/236, 0xec}], 0x2}, 0x0) sendmsg$inet(r0, &(0x7f000000c3c0)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000000)='P', 0x1}], 0x1}, 0x0) [ 170.549497][ T5855] loop5: detected capacity change from 0 to 264192 07:45:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc6, 0xc6, 0x2, [@int, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0xe2}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:02 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x80}, 0x2042) mkdir(&(0x7f0000001b40)='./file0\x00', 0x20) 07:45:02 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f00000008c0)='ns/mnt\x00') 07:45:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x9776, [{0x0, 0x3}]}]}}, &(0x7f0000000100)=""/204, 0x32, 0xcc, 0x8}, 0x20) 07:45:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/204, 0x1a, 0xcc, 0x1}, 0x20) 07:45:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc6, 0xc6, 0x2, [@int, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0xe2}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@struct, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000100)=""/204, 0x3a, 0xcc, 0x1}, 0x20) 07:45:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) sendmsg$unix(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x700, &(0x7f0000001540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) [ 170.652108][ T5864] BPF: (anon) type_id=3 bits_offset=0 [ 170.657633][ T5864] BPF: [ 170.660385][ T5864] BPF:Invalid member [ 170.664262][ T5864] BPF: [ 170.664262][ T5864] 07:45:02 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:45:02 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) [ 170.773675][ T5888] loop5: detected capacity change from 0 to 264192 07:45:02 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:02 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x1b, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 0: recvmsg$unix(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000140)=""/127, 0x7f}, {0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)=""/41, 0x29}, {&(0x7f0000001400)=""/146, 0x92}, {&(0x7f00000014c0)=""/59, 0x3b}], 0x7}, 0x2042) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000016c0)='blkio.bfq.io_merged\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)=[@rights={{0x10}}], 0x10}, 0x0) mkdir(&(0x7f0000001b40)='./file0\x00', 0x20) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001c00)='./file0\x00', 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000001cc0), 0x10) 07:45:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000100)=""/204, 0x1000000, 0xcc, 0x1}, 0x20) 07:45:02 executing program 0: socketpair(0x3, 0x0, 0x2000000, &(0x7f0000000000)) 07:45:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() close(r1) sendmsg$unix(r0, &(0x7f0000003840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=[@cred={{0x1c, 0x1, 0x2, {r2}}}], 0x20}, 0x0) 07:45:02 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) 07:45:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 171.000744][ T5918] loop5: detected capacity change from 0 to 264192 07:45:03 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) perf_event_open(&(0x7f0000000100)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 07:45:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x1}, {0xe}, {}]}]}}, &(0x7f0000000100)=""/204, 0x4a, 0xcc, 0x1}, 0x20) 07:45:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 1: socketpair(0x1d, 0x0, 0x2, &(0x7f0000000c40)) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000240)=""/170, 0x2a, 0xaa, 0x1}, 0x20) 07:45:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 1: socketpair(0x15, 0x5, 0x4, &(0x7f0000000040)) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 171.207689][ T5947] loop5: detected capacity change from 0 to 264192 07:45:03 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:03 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:45:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 07:45:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000002800)={0x0, 0x0, 0x18}, 0x10) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x3, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x103}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f000000c3c0)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000000)='P', 0x1}], 0x1}, 0x0) 07:45:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000002b00)=@base={0xa, 0x0, 0x0, 0x0, 0x341}, 0x48) 07:45:03 executing program 2: socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) 07:45:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a80)={&(0x7f0000001940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}]}}, &(0x7f00000019c0)=""/152, 0x2e, 0x98, 0x1}, 0x20) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdd, 0xdd, 0x3, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xfb}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 171.439570][ T5976] loop5: detected capacity change from 0 to 264192 07:45:03 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x2) sendmsg$unix(r0, &(0x7f0000003840)={0x0, 0x0, 0x0}, 0x0) 07:45:03 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000100)=""/204, 0x26, 0xcc, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=""/33, 0x21}}, 0x10) 07:45:03 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x145702, 0x0) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdd, 0xdd, 0x3, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xfb}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdd, 0xdd, 0x3, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0xfb}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000001d80)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001c80)="a5a583efe85d6cfd2f99b7f8e28b5a4617d940ccdb4b114138550a7f3893ac50ae288b7ffd389bf08ee145fbb10460c1b485b6ebbfb96b084db4a1f0a61ce453ce85a144e9a71a507a18d49ca494a7cdb6ec336303", 0x55}, {&(0x7f00000022c0)="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", 0xfac}], 0x2, &(0x7f0000003700)=ANY=[@ANYBLOB="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"], 0x400}, 0x0) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/88, 0x58}], 0x1}, 0x10120) 07:45:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000000100)=""/204, 0x32, 0xcc, 0x1}, 0x20) 07:45:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xffffffc6, 0x2}}, &(0x7f0000000240)=""/206, 0x26, 0xcc, 0x1}, 0x20) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x10a}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 171.651511][ T6006] loop5: detected capacity change from 0 to 264192 07:45:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x9776, [{0x74000000}]}]}}, &(0x7f0000000100)=""/204, 0x32, 0xcc, 0x1}, 0x20) 07:45:03 executing program 0: mkdir(&(0x7f0000001680)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000001480)='./file0\x00', &(0x7f0000001540), 0x0, 0x0) 07:45:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 2: perf_event_open$cgroup(&(0x7f00000076c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ac4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x292b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:45:03 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x10a}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x51d001, 0x0) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x10a}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, 0x0) 07:45:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000e140)='cgroup.freeze\x00', 0x0, 0x0) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000e200)={0x0, 0x8, &(0x7f000000e000)=@framed={{}, [@map_idx={0x18, 0x1}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x1}, @kfunc]}, &(0x7f000000e040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000e0c0)={0x4}, 0x8, 0x10, 0x0}, 0x80) 07:45:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/204, 0x1a, 0xcc, 0x1}, 0x20) 07:45:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001700)=[{0x0}, {&(0x7f0000001900)=""/236, 0xec}], 0x2}, 0x2) sendmsg$inet(r0, &(0x7f000000c3c0)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000000)="50877829a0829369e348b666a9a6d2511ff81bedc4c0d85fe299d50faebb03cffb6db33ad95af2e61e4c2964c36a4623b5c1d6ad2bf07fd935b5c8d1b40b5b45076df18e2cd5b5b249c7f59ed8f3c8fa8a6dab97abc834cd53dae2ba239cc388091750cba63782faf7bf5450dc4334bbdba6b4b141eed49d36c01cb8d65e4a3a64b99dcf94066abc177e584b52ea5fc353d94897e98537ecbd19d53b5f9f785e4925dc7cd4dc333ef1f016b931f19d1d73b20e0019724fe40d933a53b48909c1e1b0fc1b34af8e721482ae0a8d46ec332ad510777e0a2a287a70bc41f0d8ddfdf82cffc5872b0882f1984233", 0xec}], 0x1}, 0x0) 07:45:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 171.874885][ T6045] loop5: detected capacity change from 0 to 264192 07:45:03 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@struct, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xd}, {}]}]}}, &(0x7f0000000100)=""/204, 0x42, 0xcc, 0x1}, 0x20) 07:45:03 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x6, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x3, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf00}}, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000004c0)="d8a44f1eabd2a6cc6d062f434e2657d9274725d40ae15478e0e96eff3679e67cd75287cd7536cf8e342f1f5af36605c5adbf84af24978d7c4d01c3c1128b70efbb52c8f88abad3bc42119388ddbe271f29b38ca10a7f0cababb64c56a03a12e300b6302fc6cf333c359bd829596f5a1f993329207c573c4008da4c05566a7144ecea4ffed0763f93175d1d5ed4c14eb6ad1809d1b3b8c4477b049bf874e5662a3878f7b6197d5334393f91ee94292575391a4025335baa59963af3c8300bffb3ff8168c715eac4735f71a3e5a8f31d99336637fbdc41681219f81ada6277d09463263c20141ecd0e75515127c23a918315f3f746fc06b4debb81f1f81794549bb31e83d71027a0ad06ed58cdc0084554bc485395339208142fc32a9d663b50ad6c1bd1837ae630910f3b4caf6f17cb1eef37d87e15af7607c488066076a5ad09f1fc0a8e0c501dcb7c5aa819568f599ec091dc124259d00340ce9850322d3e187690a7d10de620c107270998fec49bf04b4300b6faa990731eefe897bdbdf8d837426fb02dad109810a20b42e9b3a0e97792cffaac744f60fc0b986abdc8eb70bb7a1f613c373d3a0d263ef384e25c9abcd8f215299c03f68bddfdfa318bb4a7bbc5da9f6c77343a05ff53a4a2b7049df7353274df67b54bd034e750457e0734a2de68b2420b2cfe43358d571b32ccac630f40ef27a3001999dc66556baef43de4043e114994ac8e22ff46412f6b10cf8819bd21c05702f36760136a1a8ea427f3d37c27fe4f5344f55b9292c3e3fe184ba966b8ac6048929107a7265035937a27d9c699c102a67e7f12c260d07922e80d916973ee723be6d395443dab42da324310af88e4e9263d096f12e6778a0765609b64b1b3615f00aa75274011e5407242d31176edca37c4a23e49dbfec283a597bbf19347ba295e99d4641dcd5aa25b3b3f8a5ab57f3091728f937629e5e71423481c2ae049e3e9f05a7cdf2e96c65d50ed08b9e55cd839926306566a8caa4edae4e556f7a8b83c145205aa0e13fcf188463302ea1ffbcca9ee92bb119434b44cacb01c6b0652a702de2e023c825d05245bc5596c7bd83a582bcbfb7e90232e58252a716df4ed42c815c8774d2e1e1051f0e0d30c84ca62650a46bc5e3727d88d2bcf586867616c3d0f36f40a9377613e87ca7bd67a6ebde3e32f6960e2b9a86d1e20c39f75e16200710bd9f52514d6069068799a8f2042d32b620545f197977b96a6e21aedfd5501340c7821c7377381321edf97e3f36f3bf7259657dc0330aa1b51262563d1fb4da99fc081abcc75a2a14afde46586a6b841eebaad26f963ed1851cdb48583715f0ae0c5a367fd5ea4ca192910010beb10f9f27aa3ca8612a051a4036375cff7297afbc4146264e1904a9512030841c9de2094ef5daffd73835841e0773980f8d841594f84fc04f02f6c0eed54a94060ce41d2b2e4991c19de1771eff6707263175625fd863338dff332c496e9a12ef3421cba6a2f52cc15458464c03bc1d09b964d5b8c3a656ccab7f6de11649465a4a2cb675127d73fda717e77f21ed694089a49389a18551f9dadac306a584c04036247b33b4405f59cefc4b228d09d8387a2e7967c93ea188b6af7bea4326d32f3b193c6d05b20df831de7eacb3fe0758477e21d75ccea562a0971b41229cce2510e0f0a7039a494d9060b1439701f4b593bfc7f99fd88583c739da136b6dbc38ce071f1574fabcd5ef9097bcc8b7001b56037390360e33dc9e5b1c791cd9a3a72357256f9879808fb9d81dddccd2d66da9d423e6149ff0b39b30eb2f660a8caf2876bb782346b1128384b96ee36379230ba4a200148aaf66d07e7d1564bcfaa04c71ead8f89318112c3d989bc3fa1dd434547c6c87e2b43555c79874fe0378e798928086c216e1ab97767124917b63b6883d0cda3d384dc643537d7e36ef610ed336644b72b3c8378c2d71d9d5e458fcd192abe00696316468dd098bead9bffe992e9a3f5b4bac2a6b63a50260c94da7003e788d164d2821e0be862c146ad9e5867a64c7e578593c4492a3554880a2fe2c319e9ff954e7a9b696f85afc990611f859e01c58a941fd3d31980bb24b330c4c1edea131f871e4e9018e813af7edf3dad86cd91e06314e7e436d8edf59f96871cd532d8a5530daa9de77fc14153d31e1c8cfdeb884263f85105dc667ce31a2afd68315bea32c9b6f25174a7f04122a229adc5c3cbcebd96beabea34cb1bc6d37ec2e3c2f2ee13125d59ec8dc4806abc63da3624787b9fc7ad9d5afe88602f66bbe2788c69255e4925855566f2571609aa5683b23cf09eba7ba726cd54e05a28435863cbeb631b77ab876e073e8c39d1e9d394ed5236785ccbf290d3807d379536ed76dd5a20847a9d944bb4ba72397d3b6a38afa8a3adf39c82da8197dab638a2a04164d4772241707a948da08c0e912a76542d058aeb695f1c98564c4c1804061b1a94afa31f8acb91beb22956a7e25788bd4633ff0b3c367ae327f32503561fcbfc997b378e1e59984901b9d7f0a49626456c7c392c13b6b220efe08dad0f1b9c25fa74e17ed695f33b92413f70fa9befbf8007b790c3c06e1e0017f1f783d963b125a70897a248863cb7cf068dfc45d5bb6a5afaeab0943a35b9ba2b5b08ffa13c7f2383b452d66094bba75353b7d27365adf87b4d9795bc748b9e8488d054ca58cb5d325ea5a24cfd719dfee52147f1e8edfc6d76df503444aea91ccf7f19b09c1319958bd5d55241710a0ef7c0be3f5a974c75d9fbe2afdd636af6dabd4e090d0c338508e32a74664877a8c7e99ee7576ca158f0e5188e17f2d32f5928bbe876be911bd17839f8da45f24b36abeda910cf4e724ad5c41bb8ca4604c6aac9df592118b61d1624983b29d5927d6bfc6b4a541f0ffbd8488eedd10ce8bab4bd7f26dabaf7d596833c61ea8042ad32ad1c61b08e93b452f015ae6046720431e88602df08250621dba881ce7ef72ea509a7f49189bcf07cd820733257668da9d178ad61bd67a5879813fb770d8e4a7895fc8dc4c2877c0658b2c7119ec17d501f03cf4fe0c23240e90a6464cdc027b17d198e249a1ac91c508c81c98c63d164e32ab3dbdb107fd3383cc2092f14d933594fd4148fb95d39723051cad13a75b3a336cbc4bcabbfff803716d0ba81008514d1bc49fcd140848a5042ba29d2d10b4202b242d0bccf9b6d8795567e0c0143fb50d6c8f409789c6bcacb5bc329e16c9864876befd3ece76a0fcf733c80810214028e02c5c6a9ba98ff19d3048cca200b3ed01ecc41506c52dc1b8e5e1b79e42a12ad2c65a66135b21b92ad369846b34ec8b11054ad1d80e4aec8d8b6ed545bbaa6cc36de13623c9bbed075f3814d4e70064170c917da491521222c09480a24d016e5299aea7b5c39b903dc05ba9d6514baf701a5415d12f9934508510fbc193fdf84d6077085f2ae070a7c55c44400152f3f362c32bd11a38d4450cf1a5f17399f940dd6c5c1130d6ef57c348b1cd9d496cff898430c339907ebf81d25f1472608e4c43f0a4254bcf4c3b4544251554f6c9c197b5a76e2d187c2dfb80ef319fc2befafaf469c1fd0b2363e734e8b1af39863ef5e80df4defad3bd66abaea9facf3fbd3e0c9cfcf9748723a6a173dcf0b210ec288cea9d42efe47917ccb75690763ab7177bc2769fa69cfeebdb84334cda0d03e48361e9b2d8d6084f96d43345d5e9700829f83e19b9c790fdc7d971e3b14c7e5ecfb2986d5d7e8a60770ec4ababb5a6080c5ef23d802f32f15c3fcc8a4f7f1a0207080ff989ba3831eb2ec4b81756b85955a934e28a8f48b7b5541a49f42be8dfc0d92619b2fd5897384694ea809c0c8f31dae953216bf9bb65cc43190e60052757b4d592609e6030a7e03b1d6625a927f154a64e660188aba9b76104bf658c486724a2b5f205990757bf4cf6fde9037344577c76f52504f438a72d644af06cbbf2f1ad45c92bb65524c81e56ac8acf2a9bbba527e40770d10e06e8dd677b8b87f9fc94f06ae182dbb6a9c51a1c76a0b94c952332571b871634ed7b86bb9a57b2e465895f190c04dfbbefb3f85a369c548c0d38a65f8e924aedadadc98e5ca87d36f87eef16b0fb68f5e7fab21ca178dab96b5c285efabec32d291f8888bd927a2d03141fff390514b8ea826da5223564682a5331a2b49da1b64663a133385c033b2da77fcf080ab79d0b0fb4a6c789ca05e4a2d206ca5c90bc0d2da54e97a8adfcd67c3b75442c9e3c1819448750f9b3cf1d786132ae5ebbda8e4176ccd6400d3dd2743f82b69699976b4b6efcfcc5f350c64f933699caf54b97c09feae15bd69f1561a55b3a32069a3a2ac76d8bddc9180422843520ff0f06f25567b3ac04536b5ef53596938953202289496bb3cf7c3c1f48544c9636d700dc0ecbe3ee1e6660bab23bbe75171805667d3e35b6855c2ca66294727cf339c87d9efd7e893c746280ec337a1cf53df987a86cf93b8ab50a23e1e3664a679cecd2e8bcd2f8c9f5b546ae4c0cd8128b8a83b985b34fd51e3ca3a2cabcee24e098fc375c7ab906b8d651dd2c17bb042475e98c399aa33085fb794761376005d2811efec0f12516597cae41f050812ad3af80b8d95af4afa4fcff03fc6ab84588de08a258c3915300bbdf07022b7ad049eaaf3668cd852fa5b672b4febecb6e5bfdb1b54f8ae5cc96dc76dff2909f30f33be082513bf7708db18878831154f5a7d2ed43292762b3258deda693129551a6ff421fcb9d6cc3f5a8019d5b472f3f330a813738bef7fc26a0eed53a59e5ad9e965dd2fcb4f75162bddd21a760c3794fcf32dac83ea262884dd9fc2bc038d227f1d6d43b784db3c83007a8c03afaee0334d2551fd874c374a19f245cd4f9261e46b1fcf53383b2068ae888f56793fe4778f60a75201b02b973c5f2bbc6b1cde0d05ce48193070d92b61ef82cbaa9f5e1d213b31a964310777e6a585e2232c8fbba8bd10b626a0fcfb4d8c6a0fb1f5457fcbf094186fd6eccb8111f03356fdcfe635066577af8f5cb2b0f00a9b6b91c86804e50699129986ac36df283f6c9730b570d666c0714afd27b7f58d6bced2fed006995c0f8e4a57d642db3fdd73de321bfec31ca7a21267233065ed93171412c2530b8ec91ed79f1c81c411001ddc8d69e55e0343574eb5cfce0720bd414dae93666fdcdee00cdf0782f828ce192ca1389e9fa48540c6b7a8c705e215cbf37e92a574e87d77ca11f17254d3f53c45e1e25be2bc0c397f0ff93f9f370f30bc036fa457dd0e341fa12b14d14377a8ebbf3bdf634402bb5773f6fe65a7538c9fb965e6f4a631adf8b60139242724", 0xfffffdef}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="a3", 0x1}], 0x1}, 0x0) 07:45:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a80)={&(0x7f0000001940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x4, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x10, 0x5}, {0x5}, {0x3}, {0xc, 0x3}]}, @restrict]}, {0x0, [0x0, 0x0]}}, &(0x7f00000019c0)=""/152, 0x54, 0x98, 0x1}, 0x20) 07:45:04 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000e200)={0x18, 0x3, &(0x7f000000e000)=@framed, &(0x7f000000e040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:04 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x2, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 172.101902][ T6166] loop5: detected capacity change from 0 to 264192 07:45:04 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xd}]}}, &(0x7f0000000100)=""/204, 0x26, 0xcc, 0x1}, 0x20) 07:45:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000002b00)=@base={0xa}, 0x48) 07:45:04 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002240)=@bpf_lsm={0x2, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x2}}, &(0x7f0000002000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xd}, {0xe}, {}, {0x9, 0x2}]}]}}, &(0x7f0000000100)=""/204, 0x46, 0xcc, 0x1}, 0x20) 07:45:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1}, {}]}]}}, &(0x7f0000000100)=""/204, 0x36, 0xcc, 0x1}, 0x20) 07:45:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0x0, 0x0, 0x82}, 0x48) 07:45:04 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdir(&(0x7f0000001680)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000001480)='./file0\x00', &(0x7f0000001540), 0x1000800, &(0x7f0000001580)={[{}], [{@hash}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}]}) 07:45:04 executing program 0: ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0) [ 172.329789][ T6205] loop5: detected capacity change from 0 to 264192 [ 172.337141][ T6205] ================================================================== [ 172.345230][ T6205] BUG: KCSAN: data-race in xas_create / xas_find [ 172.351560][ T6205] [ 172.353883][ T6205] write to 0xffff8881351a9001 of 1 bytes by task 2154 on cpu 0: [ 172.361504][ T6205] xas_create+0x679/0xb10 [ 172.365992][ T6205] xas_store+0x70/0xca0 [ 172.370126][ T6205] __filemap_add_folio+0x1e8/0x4d0 [ 172.375221][ T6205] filemap_add_folio+0x6b/0x150 [ 172.380069][ T6205] add_to_page_cache_lru+0x4e/0x70 [ 172.385156][ T6205] page_cache_ra_unbounded+0x274/0x430 [ 172.390592][ T6205] force_page_cache_ra+0x1e6/0x220 [ 172.395680][ T6205] page_cache_sync_ra+0xcc/0xe0 [ 172.400607][ T6205] filemap_read+0x3eb/0x16d0 [ 172.405186][ T6205] generic_file_read_iter+0x72/0x2a0 [ 172.410454][ T6205] blkdev_read_iter+0x96/0x140 [ 172.415209][ T6205] vfs_read+0x66c/0x750 [ 172.419344][ T6205] ksys_read+0xd9/0x190 [ 172.423481][ T6205] __x64_sys_read+0x3e/0x50 [ 172.427968][ T6205] do_syscall_64+0x44/0xd0 [ 172.432374][ T6205] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 172.438295][ T6205] [ 172.440598][ T6205] read to 0xffff8881351a9001 of 1 bytes by task 6205 on cpu 1: [ 172.448118][ T6205] xas_find+0x2d9/0x3c0 [ 172.452253][ T6205] find_get_entries+0xa0/0x300 [ 172.456993][ T6205] truncate_inode_pages_range+0x7a3/0xa00 [ 172.462690][ T6205] truncate_inode_pages+0x20/0x30 [ 172.467690][ T6205] set_blocksize+0x24e/0x270 [ 172.472258][ T6205] sb_min_blocksize+0x92/0x110 [ 172.477042][ T6205] fat_fill_super+0xe95/0x2af0 [ 172.481785][ T6205] msdos_fill_super+0x29/0x30 [ 172.486442][ T6205] mount_bdev+0x1e8/0x290 [ 172.490751][ T6205] msdos_mount+0x2d/0x40 [ 172.494968][ T6205] legacy_get_tree+0x70/0xc0 [ 172.499533][ T6205] vfs_get_tree+0x4a/0x1a0 [ 172.503926][ T6205] path_mount+0x11cf/0x1c40 [ 172.508408][ T6205] __se_sys_mount+0x24b/0x2f0 [ 172.513060][ T6205] __x64_sys_mount+0x63/0x70 [ 172.517625][ T6205] do_syscall_64+0x44/0xd0 [ 172.522019][ T6205] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 172.527893][ T6205] [ 172.530282][ T6205] value changed: 0x1f -> 0x00 [ 172.534942][ T6205] [ 172.537241][ T6205] Reported by Kernel Concurrency Sanitizer on: [ 172.543368][ T6205] CPU: 1 PID: 6205 Comm: syz-executor.5 Not tainted 5.16.0-rc7-syzkaller #0 [ 172.552015][ T6205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.562046][ T6205] ================================================================== 07:45:05 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000003700)={0xffffffffffffffff, 0x0, 0x0, 0x2488c825426a4efe}, 0x20) 07:45:05 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 07:45:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000100)=""/204, 0x26, 0xcc}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000005a80)={0x7}, 0x8) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000600)) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000006b00)) 07:45:05 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 173.277025][ T6235] loop5: detected capacity change from 0 to 264192 07:45:05 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3}, {0x0, 0x2}]}]}}, &(0x7f0000000100)=""/204, 0x3e, 0xcc, 0x1}, 0x20) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000140), 0x88) 07:45:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x15, 0x0) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 173.383689][ T24] audit: type=1400 audit(1641109505.352:247): avc: denied { create } for pid=6242 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 07:45:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) dup2(r1, r0) [ 173.474882][ T24] audit: type=1400 audit(1641109505.392:248): avc: denied { write } for pid=6242 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 173.494575][ T24] audit: type=1400 audit(1641109505.392:249): avc: denied { setopt } for pid=6242 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 173.514324][ T24] audit: type=1400 audit(1641109505.442:250): avc: denied { connect } for pid=6262 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 173.546424][ T6266] loop5: detected capacity change from 0 to 264192 07:45:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000003680)={0x0, 0x2, ')<'}, &(0x7f00000004c0)=0xa) 07:45:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 07:45:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10a, 0x10a, 0x2, [@int, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x126}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:05 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x5, 0x0) 07:45:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, &(0x7f00000000c0)="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", 0xfb5, 0x0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 07:45:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f00000000c0)={@multicast1}, 0xc) 07:45:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(r0, 0x0, 0x0, 0x2000c, &(0x7f0000000200)=@in={0x10, 0x2}, 0x10) 07:45:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x102, 0x102, 0x2, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x11e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000000040)=0x18) 07:45:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000180), &(0x7f0000000000)=0x90) [ 173.661540][ T24] audit: type=1400 audit(1641109505.622:251): avc: denied { getopt } for pid=6268 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 173.699183][ T6284] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 07:45:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000080)="a4", 0x1}], 0x1, &(0x7f0000000400)=[@init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @multicast2}, @init={0x14}, @sndinfo={0x1c}, @sndrcv={0x2c}, @dstaddrv4={0x10}, @dstaddrv4={0x10, 0x84, 0x9, @broadcast}], 0xa0}, 0x0) 07:45:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x102, 0x102, 0x2, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x11e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0xf) [ 173.766664][ T6296] loop5: detected capacity change from 0 to 264192 07:45:05 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f0000001340)={&(0x7f0000000000)=@in6, 0x1c, 0x0}, 0x0) 07:45:05 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r1, &(0x7f0000000240)="ca", 0x1, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000180)="e9", 0x1}], 0x1}, 0x0) dup2(r0, r1) 07:45:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@prinfo={0x14}], 0x14}, 0x100) 07:45:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x102, 0x102, 0x2, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x11e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f0000001340)={&(0x7f0000000000)=@in6, 0x1c, 0x0, 0x0, &(0x7f0000001280)=""/174, 0xae}, 0x0) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:05 executing program 2: r0 = socket(0x2, 0x3, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 07:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 174.000420][ T6338] loop5: detected capacity change from 0 to 264192 07:45:06 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) [ 174.180276][ T6340] loop5: detected capacity change from 0 to 264192 07:45:06 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0xf, 0x0) 07:45:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 07:45:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:06 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x19, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d4", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), 0x98) 07:45:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000200)={0x0, 0x200}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000280)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 07:45:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) shutdown(r0, 0x1) [ 174.739964][ T6349] loop5: detected capacity change from 0 to 264192 07:45:06 executing program 1: select(0x40, &(0x7f0000000000)={0x7}, &(0x7f0000000040)={0x2}, &(0x7f0000000080)={0x7}, 0x0) 07:45:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:06 executing program 2: select(0x40, &(0x7f00000002c0)={0x1000000000000}, 0x0, 0x0, 0x0) 07:45:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x40f, 0x0, 0x0) 07:45:06 executing program 0: select(0x0, 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) select(0x2000, &(0x7f00000002c0), &(0x7f0000000300)={0x8}, &(0x7f0000000340), 0x0) 07:45:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 174.799818][ T24] audit: type=1400 audit(1641109506.772:252): avc: denied { shutdown } for pid=6360 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 07:45:06 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x19, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d4", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:06 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000040)=""/187, 0xbb}, {&(0x7f0000000100)=""/51, 0x33}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/21, 0x15}, {&(0x7f0000000200)=""/44, 0x2c}, {&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f0000000400)=""/213, 0xd5}], 0x10000000000000e2, &(0x7f0000000280)=""/60, 0x3c}, 0x0) 07:45:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:06 executing program 1: select(0x40, &(0x7f0000000000)={0x7}, &(0x7f0000000040)={0x2}, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) select(0x40, &(0x7f00000002c0), &(0x7f0000000300)={0x8}, &(0x7f0000000340)={0x9}, 0x0) 07:45:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect(r0, &(0x7f0000000440)=@in={0x2, 0x3}, 0xc) 07:45:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:06 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) poll(&(0x7f0000001180)=[{r0, 0x80}], 0x1, 0x0) 07:45:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 175.058249][ T6403] loop5: detected capacity change from 0 to 264192 07:45:07 executing program 0: fchownat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 07:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:07 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1, 0x0, 0x0) 07:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:07 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fchownat(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 07:45:07 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x19, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d4", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:07 executing program 1: socket(0x0, 0x0, 0x40) 07:45:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 07:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:07 executing program 2: r0 = io_uring_setup(0x782d, &(0x7f0000000140)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x1100) [ 175.736200][ T6420] loop5: detected capacity change from 0 to 264192 07:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:07 executing program 2: socket(0x1, 0x0, 0x40) 07:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:07 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "29bb8b2641ed25f0c669f78dfae7dd78eac74a4dd5b4bfcce332babc3b6ce84ceed880671d8b55582438936fc4d76409324c3604c0b8d77629171e5bb2af6e14"}, 0x48, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) [ 175.772118][ T24] audit: type=1326 audit(1641109507.742:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6425 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f27d9c79e99 code=0x0 07:45:07 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:07 executing program 2: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000020, 0x0) 07:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 176.039839][ T6456] loop5: detected capacity change from 0 to 264192 07:45:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8912, 0x0) 07:45:08 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000100)=0x3) 07:45:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001480)=[{{&(0x7f0000000200)={0xa, 0x4e21, 0x0, @remote, 0x7}, 0x1c, 0x0}}], 0x1, 0x0) 07:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:08 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:08 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x4000000, &(0x7f00000022c0)={0xa, 0x0, 0x0, @loopback}, 0x20) 07:45:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c, 0x0}}], 0x14, 0x0) 07:45:08 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f00000022c0)={0xa, 0x0, 0x0, @loopback={0xffffffff00000000}}, 0x20) 07:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 176.616878][ T6468] loop5: detected capacity change from 0 to 264192 07:45:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) sendto$l2tp6(r0, 0x0, 0x0, 0x30, &(0x7f00000022c0)={0xa, 0x0, 0x0, @loopback}, 0x20) 07:45:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) sendto$l2tp6(r0, 0x0, 0x0, 0x4000000, &(0x7f00000022c0)={0xa, 0x0, 0x0, @loopback}, 0x20) 07:45:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:08 executing program 2: sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(0xffffffffffffffff, 0x0, 0x192c5dd3f047d0ec) 07:45:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r1, &(0x7f0000000180)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000340)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0x0, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0x0, 0x58, 0x29}, @NL80211_ATTR_COOKIE={0x0, 0x58, 0x6a}, @NL80211_ATTR_COOKIE, @NL80211_ATTR_COOKIE={0x0, 0x58, 0x21}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x50, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004010}, 0x10008004) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x48004) [ 176.755092][ T6496] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 07:45:08 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:08 executing program 0: r0 = io_uring_setup(0x782d, &(0x7f0000000140)) io_uring_enter(r0, 0x0, 0x52d5, 0x1, &(0x7f00000001c0), 0x200001c8) 07:45:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f00000022c0)={0xa, 0x0, 0x0, @mcast2, 0x1f}, 0x20) 07:45:08 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r0, &(0x7f0000000080)={0x23, 0x0, 0x81}, 0x10) 07:45:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:08 executing program 1: socket(0x2, 0x0, 0xfffff96f) 07:45:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x40045436, 0x0) 07:45:08 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f00000022c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xfffffdef}}, 0x20) 07:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 176.847381][ T24] audit: type=1400 audit(1641109508.812:254): avc: denied { connect } for pid=6501 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 07:45:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 176.989755][ T6524] loop5: detected capacity change from 0 to 264192 07:45:09 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:09 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, &(0x7f0000000100)="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", 0xb4d, 0x0, &(0x7f0000001100)={0xa, 0x0, 0x0, @remote}, 0x20) 07:45:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x505}, 0x14}}, 0x0) 07:45:09 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 07:45:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x2c}}, 0x0) 07:45:09 executing program 1: syz_io_uring_setup(0x59c5, &(0x7f0000000000), &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 07:45:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 177.109070][ T24] audit: type=1400 audit(1641109509.082:255): avc: denied { ioctl } for pid=6532 comm="syz-executor.1" path="socket:[29206]" dev="sockfs" ino=29206 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) [ 177.228286][ T6555] loop5: detected capacity change from 0 to 264192 07:45:09 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@flowinfo={{0x14}}, @hoplimit={{0x14}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7fff}}], 0x48}}], 0x1, 0x0) 07:45:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x540a, 0x2) 07:45:09 executing program 0: write$snapshot(0xffffffffffffffff, 0x0, 0x0) 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001600)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000033c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003300)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}], 0x20}, 0x0) 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x40045436, 0x2) 07:45:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4}, 0x20) 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 177.426377][ T6584] loop5: detected capacity change from 0 to 264192 07:45:09 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:09 executing program 2: socket(0x1e, 0x0, 0x10000000) 07:45:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000400)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000200)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}}], 0x2, 0x0) 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001780)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000015c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000001340)}, {0x0}, {0x0}], 0x9}}], 0x2, 0x0) 07:45:09 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendto$unix(r0, &(0x7f0000000000)="9e", 0x1, 0x1, &(0x7f0000001000)=@file={0x0, './file0\x00'}, 0x6e) 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 1: r0 = syz_io_uring_setup(0x2e87, &(0x7f0000000000), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x10000000) 07:45:09 executing program 0: pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f00000002c0)={0x200}, &(0x7f0000000340), &(0x7f00000003c0)={&(0x7f0000000380)={[0x1]}, 0x8}) 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 177.649556][ T6613] loop5: detected capacity change from 0 to 264192 07:45:09 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x20, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12d", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:09 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) getsockname$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000180)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f0000000340)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0x0, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0x0, 0x58, 0x29}, @NL80211_ATTR_COOKIE={0x0, 0x58, 0x6a}, @NL80211_ATTR_COOKIE={0x0, 0x58, 0x236}, @NL80211_ATTR_COOKIE={0x0, 0x58, 0x21}]}, 0x2c}}, 0x0) 07:45:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010025bd7000fedbdf25040000000800090002000000140006"], 0x30}}, 0x0) 07:45:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, 0x0}}], 0x1, 0xbb8) 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x1, &(0x7f0000000140)={{0x77359400}, {0x77359400}}, &(0x7f0000000180)) 07:45:09 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$snapshot(r0, 0x0, 0x0) 07:45:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000640)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2}}) [ 177.747392][ T6616] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 177.756977][ T6622] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 07:45:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 177.798941][ T24] audit: type=1400 audit(1641109509.772:256): avc: denied { read } for pid=6631 comm="syz-executor.1" name="snapshot" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 177.890305][ T6642] loop5: detected capacity change from 0 to 264192 07:45:09 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x20, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12d", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:09 executing program 1: socket(0x18, 0x0, 0x4) 07:45:09 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x674) 07:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000040)='@', 0x1}], 0x1}}], 0x1, 0x0) 07:45:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x2c}}, 0x0) 07:45:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) sendto$l2tp6(r0, 0x0, 0x0, 0x900, &(0x7f00000022c0)={0xa, 0x0, 0x0, @loopback}, 0x20) 07:45:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000040)='@', 0x1}], 0x1}}], 0x1, 0xd4) [ 178.139660][ T6670] loop5: detected capacity change from 0 to 264192 07:45:10 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) creat(0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x20, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12d", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000240)) sendfile(r1, r3, 0x0, 0x8400fffffffa) 07:45:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xed, 0xed, 0x3, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5411, 0xffffffffffff2bee) 07:45:10 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x7a00, 0x0, &(0x7f00000022c0)={0xa, 0x0, 0x0, @loopback}, 0x20) 07:45:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:10 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f00000022c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x7d}}, 0x20) 07:45:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x112, 0x112, 0x2, [@int, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "cd"}, @fwd, @func_proto, @restrict, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "f1"}, @array, @volatile]}}, 0x0, 0x12e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:45:10 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg$unix(r0, &(0x7f0000006440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:45:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001700)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c, 0x0}}], 0x2, 0x0) 07:45:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) sendto$l2tp6(r0, &(0x7f0000000000)="e4e42063bd763656", 0x20000008, 0x0, &(0x7f00000022c0)={0xa, 0x0, 0x0, @loopback}, 0x20) 07:45:10 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) 07:45:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001780)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002f00)=[{0x1010, 0x0, 0x0, "055b848f533ff8b9b06af14b743c1cfb61df030779dab45cc3240af9793307dcc9f551ae57ed71d8c26faae59288e2ae8cca99a745c6e7826fd7fd7ac8a1a08484eb7741b539a852ede9533e47b635419c98201da4ab2964b20076a76afb14dce125d79a6c0f28c1554de168b53eca86d6cdbea80998b850539b4ddf1fd57f662c1e7c639674bbd015f15c650ab86652e0ac2b8fcdb15910ee0da783adbf30728949d47d82b9ba40ec325be1a01fa26f0b039b5910e607394e1af6429075cd0adbb35f6348f4e63e2c2c7b5d0585dba9e1c38a8387fd48f73deae9d52507f0e4c468432c824708a1e1a2c4e5ef7e27701ebe30da428cf9d1f6ae460367aaf