0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000180)) 07:05:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x39, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:05:51 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(0x0, 0x3) 07:05:51 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:05:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0xffffff9e, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1333.241893] attempt to access beyond end of device [ 1333.241893] loop4: rw=2049, want=148, limit=14 [ 1333.246296] attempt to access beyond end of device [ 1333.246296] loop4: rw=34817, want=24, limit=14 07:05:51 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x0, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1333.282292] FAULT_INJECTION: forcing a failure. [ 1333.282292] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1333.284146] CPU: 1 PID: 9160 Comm: syz-executor.7 Not tainted 5.10.154 #1 [ 1333.284896] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1333.285829] Call Trace: [ 1333.286119] dump_stack+0x107/0x167 [ 1333.286529] should_fail.cold+0x5/0xa [ 1333.286959] _copy_from_iter_full+0x1ff/0x940 [ 1333.287461] ? __check_object_size+0x319/0x440 [ 1333.288144] netlink_sendmsg+0x86f/0xdf0 [ 1333.288599] ? netlink_unicast+0x7f0/0x7f0 [ 1333.289081] ? netlink_unicast+0x7f0/0x7f0 [ 1333.289550] sock_sendmsg+0x154/0x190 [ 1333.289987] ____sys_sendmsg+0x70d/0x870 [ 1333.290451] ? kernel_sendmsg+0x50/0x50 [ 1333.290885] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1333.291401] ? perf_trace_lock+0xac/0x490 [ 1333.291843] ? __lockdep_reset_lock+0x180/0x180 [ 1333.292337] ? perf_trace_lock+0xac/0x490 [ 1333.292795] ? SOFTIRQ_verbose+0x10/0x10 [ 1333.293247] ___sys_sendmsg+0xf3/0x170 [ 1333.293687] ? sendmsg_copy_msghdr+0x160/0x160 [ 1333.294206] ? lock_downgrade+0x6d0/0x6d0 [ 1333.294667] ? find_held_lock+0x2c/0x110 [ 1333.295131] ? __fget_files+0x296/0x480 [ 1333.295576] ? __fget_light+0xea/0x290 [ 1333.296021] __sys_sendmsg+0xe5/0x1b0 [ 1333.296446] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1333.296927] ? rcu_read_lock_any_held+0x75/0xa0 [ 1333.297435] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1333.298021] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1333.298596] ? trace_hardirqs_on+0x5b/0x180 [ 1333.299082] do_syscall_64+0x33/0x40 [ 1333.299497] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1333.300070] RIP: 0033:0x7fc65cd12b19 [ 1333.300489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1333.302555] RSP: 002b:00007fc65a288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1333.303402] RAX: ffffffffffffffda RBX: 00007fc65ce25f60 RCX: 00007fc65cd12b19 [ 1333.304187] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1333.304984] RBP: 00007fc65a2881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1333.305781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1333.306578] R13: 00007ffe29f2788f R14: 00007fc65a288300 R15: 0000000000022000 07:05:51 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x0) 07:05:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') fcntl$notify(r0, 0x402, 0xa) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00'}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r2, 0xa0) ioctl$F2FS_IOC_GET_FEATURES(r2, 0x8004f50c, &(0x7f0000000040)) open_by_handle_at(r1, &(0x7f0000000180)=@OVL_FILEID_V1={0x9b, 0xf8, {'\x00', {0x0, 0xfb, 0x98, 0x4, 0x1, "aaeb265b8eb55e83ff73ee48161d60e5", "ba5982ab9cf3825a301f393247a7b917f97db42250980bc9cddb8e8101b1c7f12b34091fca0734cf2431a488b0302bf3246076ecb5228f1560cc879baedd3bea504511dc222ae6508d472c81b00031a08d95ad28a99a439a74a394aaacc4ea1561bad44652d6ff47fb82b85c3f3178529712639d09219840460d27ba7cb5152bc5a209"}}}, 0x20801) [ 1333.365132] audit: type=1400 audit(1668668751.742:21): avc: denied { watch } for pid=9169 comm="syz-executor.1" path="/proc/9169/ns" dev="proc" ino=31145 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 07:06:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x4d, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:06:08 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x0, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:08 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x0) 07:06:08 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:06:08 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0xffffffea, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:06:08 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) (fail_nth: 10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:08 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) io_setup(0x3, &(0x7f0000005a80)=0x0) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) io_submit(r1, 0x2, &(0x7f0000000400)=[&(0x7f0000005bc0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000005cc0)={0x0, 0x0, 0x2, 0x5, 0x0, r2, 0x0}]) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r3, 0xa0) openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) clone3(&(0x7f0000000280)={0x800, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0xf}, &(0x7f0000000440)=""/4096, 0x1000, &(0x7f0000000140)=""/210, &(0x7f0000000240)=[0x0, 0x0], 0x2, {r3}}, 0x58) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0x8, 0x6}) 07:06:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x41, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1350.338989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9192 comm=syz-executor.6 [ 1350.367401] FAULT_INJECTION: forcing a failure. [ 1350.367401] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.370020] CPU: 0 PID: 9196 Comm: syz-executor.7 Not tainted 5.10.154 #1 [ 1350.371415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.373104] Call Trace: [ 1350.373651] dump_stack+0x107/0x167 [ 1350.374405] should_fail.cold+0x5/0xa [ 1350.375187] ? __alloc_skb+0x6d/0x620 [ 1350.375972] should_failslab+0x5/0x20 [ 1350.376751] kmem_cache_alloc_node+0x55/0x370 [ 1350.377670] __alloc_skb+0x6d/0x620 [ 1350.378430] netlink_dump+0x735/0x1050 [ 1350.379246] ? netlink_insert+0x1640/0x1640 [ 1350.380120] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1350.381107] ? lock_downgrade+0x6d0/0x6d0 [ 1350.381971] __netlink_dump_start+0x649/0x900 [ 1350.382890] rtnetlink_rcv_msg+0x72a/0xb10 [ 1350.383741] ? do_set_master+0x230/0x230 [ 1350.384568] ? rtnetlink_put_metrics+0x510/0x510 [ 1350.385643] ? do_set_master+0x230/0x230 [ 1350.386497] ? __lockdep_reset_lock+0x180/0x180 [ 1350.387470] netlink_rcv_skb+0x14b/0x430 [ 1350.388304] ? rtnetlink_put_metrics+0x510/0x510 [ 1350.389278] ? netlink_ack+0xab0/0xab0 [ 1350.390087] ? netlink_deliver_tap+0x1ae/0xc40 [ 1350.391034] ? netlink_deliver_tap+0x1c4/0xc40 [ 1350.391976] ? is_vmalloc_addr+0x7b/0xb0 [ 1350.392847] netlink_unicast+0x549/0x7f0 [ 1350.393847] ? netlink_attachskb+0x810/0x810 [ 1350.394782] netlink_sendmsg+0x905/0xdf0 [ 1350.395626] ? netlink_unicast+0x7f0/0x7f0 [ 1350.396509] ? netlink_unicast+0x7f0/0x7f0 [ 1350.397380] sock_sendmsg+0x154/0x190 [ 1350.398200] ____sys_sendmsg+0x70d/0x870 [ 1350.399042] ? kernel_sendmsg+0x50/0x50 [ 1350.399854] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1350.400791] ? perf_trace_lock+0xac/0x490 [ 1350.401656] ? __lockdep_reset_lock+0x180/0x180 [ 1350.402614] ? perf_trace_lock+0xac/0x490 [ 1350.403467] ? SOFTIRQ_verbose+0x10/0x10 [ 1350.404313] ___sys_sendmsg+0xf3/0x170 [ 1350.405119] ? sendmsg_copy_msghdr+0x160/0x160 [ 1350.406078] ? lock_downgrade+0x6d0/0x6d0 [ 1350.406932] ? find_held_lock+0x2c/0x110 [ 1350.407779] ? __fget_files+0x296/0x480 [ 1350.408609] ? __fget_light+0xea/0x290 [ 1350.409418] __sys_sendmsg+0xe5/0x1b0 [ 1350.410216] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1350.411099] ? rcu_read_lock_any_held+0x75/0xa0 [ 1350.412082] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.413153] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.414220] ? trace_hardirqs_on+0x5b/0x180 [ 1350.415110] do_syscall_64+0x33/0x40 [ 1350.415877] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1350.416926] RIP: 0033:0x7fc65cd12b19 [ 1350.417693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.421414] RSP: 002b:00007fc65a288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1350.422985] RAX: ffffffffffffffda RBX: 00007fc65ce25f60 RCX: 00007fc65cd12b19 [ 1350.424436] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1350.426159] RBP: 00007fc65a2881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1350.427604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1350.429060] R13: 00007ffe29f2788f R14: 00007fc65a288300 R15: 0000000000022000 07:06:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x51, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) [ 1350.467923] attempt to access beyond end of device [ 1350.467923] loop4: rw=2049, want=148, limit=14 [ 1350.496404] attempt to access beyond end of device [ 1350.496404] loop4: rw=34817, want=24, limit=14 07:06:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x2000, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:06:08 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) (fail_nth: 11) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40086607, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000001100), &(0x7f0000001140)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = dup2(r0, r2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001180)={'wlan1\x00'}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/partitions\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000011c0)=""/65, 0x41, 0x1ff) bind$inet6(r3, &(0x7f00000010c0)={0xa, 0x4e22, 0x4c, @dev={0xfe, 0x80, '\x00', 0x28}, 0x6}, 0x1c) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000001e00)={{r1}, 0x0, 0x0, @unused=[0x3ff, 0x200, 0x3, 0x80000000], @name="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"}) pread64(r4, &(0x7f0000000040)=""/4117, 0x1015, 0x120000) inotify_rm_watch(r4, 0x0) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0xffffffffffffffe6, 0x800) 07:06:08 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0xfffffff0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:06:08 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x0, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1350.569244] FAULT_INJECTION: forcing a failure. [ 1350.569244] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.571995] CPU: 1 PID: 9213 Comm: syz-executor.7 Not tainted 5.10.154 #1 [ 1350.573404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.575093] Call Trace: [ 1350.575633] dump_stack+0x107/0x167 [ 1350.576379] should_fail.cold+0x5/0xa [ 1350.577152] ? create_object.isra.0+0x3a/0xa20 [ 1350.578084] should_failslab+0x5/0x20 [ 1350.578850] kmem_cache_alloc+0x5b/0x360 [ 1350.579690] create_object.isra.0+0x3a/0xa20 [ 1350.580575] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1350.581613] kmem_cache_alloc_node+0x169/0x370 [ 1350.582553] __alloc_skb+0x6d/0x620 [ 1350.583304] netlink_dump+0x735/0x1050 [ 1350.584100] ? __mutex_unlock_slowpath+0x2eb/0x600 [ 1350.585093] ? netlink_insert+0x1640/0x1640 [ 1350.585979] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1350.586972] ? lock_downgrade+0x6d0/0x6d0 [ 1350.587819] __netlink_dump_start+0x649/0x900 [ 1350.588736] rtnetlink_rcv_msg+0x72a/0xb10 [ 1350.589584] ? do_set_master+0x230/0x230 [ 1350.590426] ? rtnetlink_put_metrics+0x510/0x510 [ 1350.591382] ? do_set_master+0x230/0x230 [ 1350.592209] ? __lockdep_reset_lock+0x180/0x180 [ 1350.593166] netlink_rcv_skb+0x14b/0x430 [ 1350.594008] ? rtnetlink_put_metrics+0x510/0x510 [ 1350.594970] ? netlink_ack+0xab0/0xab0 [ 1350.595752] ? netlink_deliver_tap+0x1ae/0xc40 [ 1350.596714] ? netlink_deliver_tap+0x1c4/0xc40 [ 1350.597634] ? is_vmalloc_addr+0x7b/0xb0 [ 1350.598480] netlink_unicast+0x549/0x7f0 [ 1350.599313] ? netlink_attachskb+0x810/0x810 [ 1350.600234] netlink_sendmsg+0x905/0xdf0 [ 1350.601078] ? netlink_unicast+0x7f0/0x7f0 [ 1350.602002] ? netlink_unicast+0x7f0/0x7f0 [ 1350.602885] sock_sendmsg+0x154/0x190 [ 1350.603674] ____sys_sendmsg+0x70d/0x870 [ 1350.604504] ? kernel_sendmsg+0x50/0x50 [ 1350.605321] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1350.606284] ? perf_trace_lock+0xac/0x490 [ 1350.607150] ? __lockdep_reset_lock+0x180/0x180 [ 1350.608117] ? perf_trace_lock+0xac/0x490 [ 1350.608980] ? SOFTIRQ_verbose+0x10/0x10 [ 1350.609821] ___sys_sendmsg+0xf3/0x170 [ 1350.610644] ? sendmsg_copy_msghdr+0x160/0x160 [ 1350.611606] ? lock_downgrade+0x6d0/0x6d0 [ 1350.612476] ? find_held_lock+0x2c/0x110 [ 1350.613333] ? __fget_files+0x296/0x480 [ 1350.614190] ? __fget_light+0xea/0x290 [ 1350.615006] __sys_sendmsg+0xe5/0x1b0 [ 1350.615780] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1350.616675] ? rcu_read_lock_any_held+0x75/0xa0 [ 1350.617651] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.618743] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.619817] ? trace_hardirqs_on+0x5b/0x180 [ 1350.620696] do_syscall_64+0x33/0x40 [ 1350.621465] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1350.622519] RIP: 0033:0x7fc65cd12b19 [ 1350.623282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.627043] RSP: 002b:00007fc65a288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1350.628599] RAX: ffffffffffffffda RBX: 00007fc65ce25f60 RCX: 00007fc65cd12b19 [ 1350.630068] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1350.631522] RBP: 00007fc65a2881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1350.632993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1350.634454] R13: 00007ffe29f2788f R14: 00007fc65a288300 R15: 0000000000022000 07:06:09 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x0) 07:06:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x56, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) [ 1350.704295] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9224 comm=syz-executor.6 07:06:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0xb901, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1350.763306] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 07:06:09 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) (fail_nth: 12) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0xffffffff, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1350.907297] attempt to access beyond end of device [ 1350.907297] loop4: rw=2049, want=148, limit=14 [ 1350.940360] attempt to access beyond end of device [ 1350.940360] loop4: rw=34817, want=24, limit=14 [ 1350.968319] FAULT_INJECTION: forcing a failure. [ 1350.968319] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.972149] CPU: 0 PID: 9244 Comm: syz-executor.7 Not tainted 5.10.154 #1 [ 1350.973567] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.975254] Call Trace: [ 1350.975795] dump_stack+0x107/0x167 [ 1350.976542] should_fail.cold+0x5/0xa [ 1350.977323] should_failslab+0x5/0x20 [ 1350.978106] __kmalloc_node_track_caller+0x74/0x3f0 [ 1350.979125] ? netlink_dump+0x735/0x1050 [ 1350.979963] __alloc_skb+0xb1/0x620 [ 1350.980710] netlink_dump+0x735/0x1050 [ 1350.981511] ? netlink_insert+0x1640/0x1640 [ 1350.982409] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1350.983396] ? lock_downgrade+0x6d0/0x6d0 [ 1350.984245] __netlink_dump_start+0x649/0x900 [ 1350.985172] rtnetlink_rcv_msg+0x72a/0xb10 [ 1350.986049] ? do_set_master+0x230/0x230 [ 1350.986875] ? rtnetlink_put_metrics+0x510/0x510 [ 1350.987833] ? do_set_master+0x230/0x230 [ 1350.988667] ? __lockdep_reset_lock+0x180/0x180 [ 1350.989620] netlink_rcv_skb+0x14b/0x430 [ 1350.990453] ? rtnetlink_put_metrics+0x510/0x510 [ 1350.991411] ? netlink_ack+0xab0/0xab0 [ 1350.992196] ? netlink_deliver_tap+0x1ae/0xc40 [ 1350.993132] ? netlink_deliver_tap+0x1c4/0xc40 [ 1350.994084] ? is_vmalloc_addr+0x7b/0xb0 [ 1350.994916] netlink_unicast+0x549/0x7f0 [ 1350.995753] ? netlink_attachskb+0x810/0x810 [ 1350.996661] netlink_sendmsg+0x905/0xdf0 [ 1350.997494] ? netlink_unicast+0x7f0/0x7f0 [ 1350.998376] ? netlink_unicast+0x7f0/0x7f0 [ 1350.999232] sock_sendmsg+0x154/0x190 [ 1351.000011] ____sys_sendmsg+0x70d/0x870 [ 1351.000841] ? kernel_sendmsg+0x50/0x50 [ 1351.001654] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1351.002601] ? perf_trace_lock+0xac/0x490 [ 1351.003449] ? __lockdep_reset_lock+0x180/0x180 [ 1351.004389] ? perf_trace_lock+0xac/0x490 [ 1351.005226] ? SOFTIRQ_verbose+0x10/0x10 [ 1351.006066] ___sys_sendmsg+0xf3/0x170 [ 1351.006855] ? sendmsg_copy_msghdr+0x160/0x160 [ 1351.007787] ? lock_downgrade+0x6d0/0x6d0 [ 1351.008630] ? find_held_lock+0x2c/0x110 [ 1351.009470] ? __fget_files+0x296/0x480 [ 1351.010304] ? __fget_light+0xea/0x290 [ 1351.011106] __sys_sendmsg+0xe5/0x1b0 [ 1351.011877] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1351.012748] ? rcu_read_lock_any_held+0x75/0xa0 [ 1351.013714] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1351.014783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1351.015838] ? trace_hardirqs_on+0x5b/0x180 [ 1351.016712] do_syscall_64+0x33/0x40 [ 1351.017472] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1351.018517] RIP: 0033:0x7fc65cd12b19 [ 1351.019259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1351.023016] RSP: 002b:00007fc65a288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1351.024575] RAX: ffffffffffffffda RBX: 00007fc65ce25f60 RCX: 00007fc65cd12b19 [ 1351.026038] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1351.027492] RBP: 00007fc65a2881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1351.028952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1351.030437] R13: 00007ffe29f2788f R14: 00007fc65a288300 R15: 0000000000022000 07:06:22 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) (fail_nth: 13) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:22 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 1) 07:06:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x5f, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:06:22 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x0, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0xf, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:06:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x7ffffff2, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:06:22 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:06:22 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x48, 0x0, 0x4, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x6, 0xb}}}}, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1ff}]}, 0x48}, 0x1, 0x0, 0x0, 0x84}, 0x4000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f00000035c0)=[{{&(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10, 0x0}}, {{&(0x7f0000001140)={0x2, 0x0, @broadcast}, 0x10, 0x0}}], 0x2, 0x0) [ 1363.721143] FAULT_INJECTION: forcing a failure. [ 1363.721143] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.724259] CPU: 1 PID: 9252 Comm: syz-executor.7 Not tainted 5.10.154 #1 [ 1363.725650] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1363.727341] Call Trace: [ 1363.727886] dump_stack+0x107/0x167 [ 1363.728638] should_fail.cold+0x5/0xa [ 1363.729412] ? create_object.isra.0+0x3a/0xa20 [ 1363.730371] should_failslab+0x5/0x20 [ 1363.731145] kmem_cache_alloc+0x5b/0x360 [ 1363.731981] create_object.isra.0+0x3a/0xa20 [ 1363.732871] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1363.733908] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 1363.734953] ? netlink_dump+0x735/0x1050 [ 1363.735784] __alloc_skb+0xb1/0x620 [ 1363.736534] netlink_dump+0x735/0x1050 [ 1363.737334] ? netlink_insert+0x1640/0x1640 [ 1363.738224] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1363.739230] ? lock_downgrade+0x6d0/0x6d0 [ 1363.740087] __netlink_dump_start+0x649/0x900 [ 1363.741010] rtnetlink_rcv_msg+0x72a/0xb10 [ 1363.741866] ? do_set_master+0x230/0x230 [ 1363.742703] ? rtnetlink_put_metrics+0x510/0x510 [ 1363.743666] ? do_set_master+0x230/0x230 [ 1363.744501] ? __lockdep_reset_lock+0x180/0x180 [ 1363.745457] netlink_rcv_skb+0x14b/0x430 [ 1363.746306] ? rtnetlink_put_metrics+0x510/0x510 [ 1363.747268] ? netlink_ack+0xab0/0xab0 [ 1363.748054] ? netlink_deliver_tap+0x1ae/0xc40 [ 1363.748990] ? netlink_deliver_tap+0x1c4/0xc40 [ 1363.749915] ? is_vmalloc_addr+0x7b/0xb0 [ 1363.750758] netlink_unicast+0x549/0x7f0 [ 1363.751594] ? netlink_attachskb+0x810/0x810 [ 1363.752502] netlink_sendmsg+0x905/0xdf0 [ 1363.753341] ? netlink_unicast+0x7f0/0x7f0 [ 1363.754231] ? netlink_unicast+0x7f0/0x7f0 [ 1363.755090] sock_sendmsg+0x154/0x190 [ 1363.755870] ____sys_sendmsg+0x70d/0x870 [ 1363.756699] ? kernel_sendmsg+0x50/0x50 [ 1363.757504] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1363.758444] ? perf_trace_lock+0xac/0x490 [ 1363.759291] ? __lockdep_reset_lock+0x180/0x180 [ 1363.760234] ? perf_trace_lock+0xac/0x490 [ 1363.761071] ? SOFTIRQ_verbose+0x10/0x10 [ 1363.761897] ___sys_sendmsg+0xf3/0x170 [ 1363.762701] ? sendmsg_copy_msghdr+0x160/0x160 [ 1363.763636] ? lock_downgrade+0x6d0/0x6d0 [ 1363.764478] ? find_held_lock+0x2c/0x110 [ 1363.765318] ? __fget_files+0x296/0x480 [ 1363.766153] ? __fget_light+0xea/0x290 [ 1363.766951] __sys_sendmsg+0xe5/0x1b0 [ 1363.767720] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1363.768598] ? rcu_read_lock_any_held+0x75/0xa0 [ 1363.769571] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1363.770641] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1363.771683] ? trace_hardirqs_on+0x5b/0x180 [ 1363.772566] do_syscall_64+0x33/0x40 [ 1363.773321] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1363.774369] RIP: 0033:0x7fc65cd12b19 [ 1363.775126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.778839] RSP: 002b:00007fc65a288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1363.780378] RAX: ffffffffffffffda RBX: 00007fc65ce25f60 RCX: 00007fc65cd12b19 [ 1363.781816] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1363.783272] RBP: 00007fc65a2881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1363.784710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1363.786157] R13: 00007ffe29f2788f R14: 00007fc65a288300 R15: 0000000000022000 07:06:22 executing program 1: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x5e6a, 0x0, 0x0, 0x205}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x0, 0x0, r3, 0x0, r0, 0x2, 0x0, 0x1}, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x2204, &(0x7f0000000100)={0x0, 0x283c, 0x20, 0x2, 0xe6, 0x0, r0}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000040), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000200)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd=r0, 0x93d, {0x0, r0}, 0x8, 0x4, 0x0, {0x0, 0x0, r0}}, 0x3) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x200, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) 07:06:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x82, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:06:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x14, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1363.904674] attempt to access beyond end of device [ 1363.904674] loop4: rw=2049, want=148, limit=14 [ 1363.922312] attempt to access beyond end of device 07:06:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x7ffffff9, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1363.922312] loop4: rw=34817, want=24, limit=14 [ 1363.941323] FAULT_INJECTION: forcing a failure. [ 1363.941323] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.943782] CPU: 1 PID: 9261 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1363.945200] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1363.946915] Call Trace: [ 1363.947470] dump_stack+0x107/0x167 [ 1363.948235] should_fail.cold+0x5/0xa [ 1363.948996] ? getname_flags.part.0+0x50/0x4f0 [ 1363.949899] should_failslab+0x5/0x20 [ 1363.950680] kmem_cache_alloc+0x5b/0x360 [ 1363.951513] getname_flags.part.0+0x50/0x4f0 [ 1363.952408] user_path_at_empty+0xa1/0x100 [ 1363.953266] do_sys_truncate.part.0+0x86/0x140 [ 1363.954229] ? vfs_truncate+0x5e0/0x5e0 [ 1363.955037] ? ksys_write+0x1a9/0x260 [ 1363.955831] __x64_sys_truncate+0x69/0xa0 [ 1363.956684] do_syscall_64+0x33/0x40 [ 1363.957455] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1363.958514] RIP: 0033:0x7f5ee866bb19 [ 1363.959265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.963019] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1363.964575] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1363.966020] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1363.967485] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1363.968943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1363.970413] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 07:06:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:06:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0xd7, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:06:22 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) (fail_nth: 14) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:22 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x0, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:22 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 2) [ 1364.178348] FAULT_INJECTION: forcing a failure. [ 1364.178348] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.178369] CPU: 0 PID: 9301 Comm: syz-executor.7 Not tainted 5.10.154 #1 [ 1364.178377] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1364.178382] Call Trace: [ 1364.178409] dump_stack+0x107/0x167 [ 1364.178427] should_fail.cold+0x5/0xa [ 1364.178444] ? __skb_ext_alloc+0x19/0x90 [ 1364.178461] should_failslab+0x5/0x20 [ 1364.178476] kmem_cache_alloc+0x5b/0x360 [ 1364.178497] __skb_ext_alloc+0x19/0x90 [ 1364.178509] skb_ext_add+0x508/0x670 [ 1364.178524] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 1364.178546] __alloc_skb+0x3c1/0x620 [ 1364.178568] netlink_dump+0x735/0x1050 [ 1364.178590] ? netlink_insert+0x1640/0x1640 [ 1364.178604] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1364.178630] ? lock_downgrade+0x6d0/0x6d0 [ 1364.178653] __netlink_dump_start+0x649/0x900 [ 1364.178676] rtnetlink_rcv_msg+0x72a/0xb10 [ 1364.178689] ? do_set_master+0x230/0x230 [ 1364.178708] ? rtnetlink_put_metrics+0x510/0x510 [ 1364.178724] ? do_set_master+0x230/0x230 [ 1364.178744] ? __lockdep_reset_lock+0x180/0x180 [ 1364.178768] netlink_rcv_skb+0x14b/0x430 [ 1364.178784] ? rtnetlink_put_metrics+0x510/0x510 [ 1364.178802] ? netlink_ack+0xab0/0xab0 [ 1364.178815] ? netlink_deliver_tap+0x1ae/0xc40 [ 1364.178838] ? netlink_deliver_tap+0x1c4/0xc40 [ 1364.178852] ? is_vmalloc_addr+0x7b/0xb0 [ 1364.178874] netlink_unicast+0x549/0x7f0 [ 1364.178901] ? netlink_attachskb+0x810/0x810 [ 1364.178930] netlink_sendmsg+0x905/0xdf0 [ 1364.178954] ? netlink_unicast+0x7f0/0x7f0 [ 1364.178982] ? netlink_unicast+0x7f0/0x7f0 [ 1364.178999] sock_sendmsg+0x154/0x190 [ 1364.179017] ____sys_sendmsg+0x70d/0x870 [ 1364.179037] ? kernel_sendmsg+0x50/0x50 [ 1364.179049] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1364.179063] ? perf_trace_lock+0xac/0x490 [ 1364.179084] ? __lockdep_reset_lock+0x180/0x180 [ 1364.179096] ? perf_trace_lock+0xac/0x490 [ 1364.179110] ? SOFTIRQ_verbose+0x10/0x10 [ 1364.179128] ___sys_sendmsg+0xf3/0x170 [ 1364.179145] ? sendmsg_copy_msghdr+0x160/0x160 [ 1364.179166] ? lock_downgrade+0x6d0/0x6d0 [ 1364.179184] ? find_held_lock+0x2c/0x110 [ 1364.179208] ? __fget_files+0x296/0x480 [ 1364.179234] ? __fget_light+0xea/0x290 [ 1364.179257] __sys_sendmsg+0xe5/0x1b0 [ 1364.179271] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1364.179285] ? rcu_read_lock_any_held+0x75/0xa0 [ 1364.179319] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1364.179335] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1364.179351] ? trace_hardirqs_on+0x5b/0x180 [ 1364.179369] do_syscall_64+0x33/0x40 [ 1364.179384] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1364.179395] RIP: 0033:0x7fc65cd12b19 [ 1364.179410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1364.179418] RSP: 002b:00007fc65a288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1364.179435] RAX: ffffffffffffffda RBX: 00007fc65ce25f60 RCX: 00007fc65cd12b19 [ 1364.179443] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1364.179452] RBP: 00007fc65a2881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1364.179460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1364.179469] R13: 00007ffe29f2788f R14: 00007fc65a288300 R15: 0000000000022000 [ 1364.215154] attempt to access beyond end of device [ 1364.215154] loop4: rw=2049, want=148, limit=14 [ 1364.218231] attempt to access beyond end of device [ 1364.218231] loop4: rw=34817, want=24, limit=14 [ 1364.220390] FAULT_INJECTION: forcing a failure. [ 1364.220390] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.220634] CPU: 1 PID: 9304 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1364.220645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1364.220651] Call Trace: [ 1364.220679] dump_stack+0x107/0x167 [ 1364.220703] should_fail.cold+0x5/0xa [ 1364.220724] ? create_object.isra.0+0x3a/0xa20 [ 1364.220745] should_failslab+0x5/0x20 [ 1364.220762] kmem_cache_alloc+0x5b/0x360 [ 1364.220788] create_object.isra.0+0x3a/0xa20 [ 1364.220807] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1364.220832] kmem_cache_alloc+0x159/0x360 [ 1364.220862] getname_flags.part.0+0x50/0x4f0 [ 1364.220887] user_path_at_empty+0xa1/0x100 [ 1364.220915] do_sys_truncate.part.0+0x86/0x140 [ 1364.220933] ? vfs_truncate+0x5e0/0x5e0 [ 1364.220949] ? ksys_write+0x1a9/0x260 [ 1364.220981] __x64_sys_truncate+0x69/0xa0 [ 1364.221001] do_syscall_64+0x33/0x40 [ 1364.221021] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1364.221034] RIP: 0033:0x7f5ee866bb19 [ 1364.221053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1364.221063] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1364.221084] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1364.221095] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1364.221106] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1364.221116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1364.221127] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1364.221597] attempt to access beyond end of device [ 1364.221597] loop4: rw=0, want=21, limit=14 07:06:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:06:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x3a, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:06:38 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x0, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x2000, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:06:38 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 3) 07:06:38 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:06:38 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) (fail_nth: 15) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000180)=""/232, 0xe8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x10000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r2, r1, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x7f, 0xfd, 0x40, 0x0, 0x9, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x762, 0x0, @perf_config_ext={0x4, 0x1}, 0x40000, 0xd3, 0x3f, 0x4, 0x101, 0x9, 0x0, 0x0, 0x8000, 0x0, 0x7}, 0x0, 0x10, r0, 0x11) preadv(r1, &(0x7f00000013c0)=[{&(0x7f00000011c0)=""/119, 0x77}], 0x1, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:06:38 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 4) 07:06:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0xb901, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:06:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x1a18c1, 0x0) recvmsg$unix(r0, &(0x7f00000026c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000024c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/127, 0x7f}, {&(0x7f0000002240)=""/50, 0x32}, {&(0x7f0000002280)=""/228, 0xe4}, {&(0x7f0000002380)=""/209, 0xd1}, {&(0x7f0000002480)=""/28, 0x1c}], 0x7, &(0x7f0000002540)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x180}, 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r2, 0xa0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x7, 0x8, 0x3, 0x0, 0x8, 0x20, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x1006d, 0x7, 0x6, 0x8, 0x80000000, 0x72d9, 0x1, 0x0, 0x800, 0x0, 0x3}, r1, 0xb, r2, 0xa) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfec4) 07:06:38 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:06:38 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) (fail_nth: 16) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:38 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0xc0, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1379.978831] attempt to access beyond end of device [ 1379.978831] loop4: rw=2049, want=148, limit=14 [ 1379.980884] attempt to access beyond end of device [ 1379.980884] loop4: rw=34817, want=24, limit=14 [ 1379.981339] FAULT_INJECTION: forcing a failure. [ 1379.981339] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1379.981351] CPU: 1 PID: 9318 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1379.981358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1379.981362] Call Trace: [ 1379.981380] dump_stack+0x107/0x167 [ 1379.981398] should_fail.cold+0x5/0xa [ 1379.981415] strncpy_from_user+0x34/0x470 [ 1379.981433] getname_flags.part.0+0x95/0x4f0 [ 1379.981447] user_path_at_empty+0xa1/0x100 [ 1379.981461] do_sys_truncate.part.0+0x86/0x140 [ 1379.981471] ? vfs_truncate+0x5e0/0x5e0 [ 1379.981481] ? ksys_write+0x1a9/0x260 [ 1379.981498] __x64_sys_truncate+0x69/0xa0 [ 1379.981510] do_syscall_64+0x33/0x40 [ 1379.981522] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1379.981529] RIP: 0033:0x7f5ee866bb19 [ 1379.981539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1379.981544] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1379.981556] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1379.981562] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1379.981568] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1379.981575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1379.981581] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1380.006555] netlink: 30 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1380.016763] netlink: 30 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1380.022288] FAULT_INJECTION: forcing a failure. [ 1380.022288] name failslab, interval 1, probability 0, space 0, times 0 [ 1380.022310] CPU: 1 PID: 9328 Comm: syz-executor.7 Not tainted 5.10.154 #1 [ 1380.022321] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1380.022327] Call Trace: [ 1380.022345] dump_stack+0x107/0x167 [ 1380.022358] should_fail.cold+0x5/0xa [ 1380.022369] ? create_object.isra.0+0x3a/0xa20 [ 1380.022382] should_failslab+0x5/0x20 [ 1380.022397] kmem_cache_alloc+0x5b/0x360 [ 1380.022411] create_object.isra.0+0x3a/0xa20 [ 1380.022422] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1380.022436] kmem_cache_alloc+0x159/0x360 [ 1380.022453] __skb_ext_alloc+0x19/0x90 [ 1380.022462] skb_ext_add+0x508/0x670 [ 1380.022473] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 1380.022488] __alloc_skb+0x3c1/0x620 [ 1380.022504] netlink_dump+0x735/0x1050 [ 1380.022520] ? netlink_insert+0x1640/0x1640 [ 1380.022529] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1380.022549] ? lock_downgrade+0x6d0/0x6d0 [ 1380.022564] __netlink_dump_start+0x649/0x900 [ 1380.022582] rtnetlink_rcv_msg+0x72a/0xb10 [ 1380.022591] ? do_set_master+0x230/0x230 [ 1380.022604] ? rtnetlink_put_metrics+0x510/0x510 [ 1380.022616] ? do_set_master+0x230/0x230 [ 1380.022630] ? __lockdep_reset_lock+0x180/0x180 [ 1380.022647] netlink_rcv_skb+0x14b/0x430 [ 1380.022660] ? rtnetlink_put_metrics+0x510/0x510 [ 1380.022672] ? netlink_ack+0xab0/0xab0 [ 1380.022682] ? netlink_deliver_tap+0x1ae/0xc40 [ 1380.022697] ? netlink_deliver_tap+0x1c4/0xc40 [ 1380.022709] ? is_vmalloc_addr+0x7b/0xb0 [ 1380.022727] netlink_unicast+0x549/0x7f0 [ 1380.022746] ? netlink_attachskb+0x810/0x810 [ 1380.022765] netlink_sendmsg+0x905/0xdf0 [ 1380.022782] ? netlink_unicast+0x7f0/0x7f0 [ 1380.022801] ? netlink_unicast+0x7f0/0x7f0 [ 1380.022814] sock_sendmsg+0x154/0x190 [ 1380.022827] ____sys_sendmsg+0x70d/0x870 [ 1380.022841] ? kernel_sendmsg+0x50/0x50 [ 1380.022850] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1380.022860] ? perf_trace_lock+0xac/0x490 [ 1380.022874] ? __lockdep_reset_lock+0x180/0x180 [ 1380.022883] ? perf_trace_lock+0xac/0x490 [ 1380.022893] ? SOFTIRQ_verbose+0x10/0x10 [ 1380.022905] ___sys_sendmsg+0xf3/0x170 [ 1380.022917] ? sendmsg_copy_msghdr+0x160/0x160 [ 1380.022932] ? lock_downgrade+0x6d0/0x6d0 [ 1380.022945] ? find_held_lock+0x2c/0x110 [ 1380.022962] ? __fget_files+0x296/0x480 [ 1380.022980] ? __fget_light+0xea/0x290 [ 1380.022996] __sys_sendmsg+0xe5/0x1b0 [ 1380.023005] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1380.023016] ? rcu_read_lock_any_held+0x75/0xa0 [ 1380.023039] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1380.023051] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1380.023062] ? trace_hardirqs_on+0x5b/0x180 [ 1380.023075] do_syscall_64+0x33/0x40 [ 1380.023086] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1380.023093] RIP: 0033:0x7fc65cd12b19 [ 1380.023104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1380.023109] RSP: 002b:00007fc65a288188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1380.023121] RAX: ffffffffffffffda RBX: 00007fc65ce25f60 RCX: 00007fc65cd12b19 [ 1380.023127] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1380.023133] RBP: 00007fc65a2881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1380.023139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1380.023145] R13: 00007ffe29f2788f R14: 00007fc65a288300 R15: 0000000000022000 [ 1380.038762] attempt to access beyond end of device [ 1380.038762] loop5: rw=2049, want=24, limit=14 [ 1380.100082] attempt to access beyond end of device [ 1380.100082] loop5: rw=1, want=21, limit=14 [ 1380.159283] attempt to access beyond end of device [ 1380.159283] loop4: rw=2049, want=148, limit=14 [ 1380.162824] attempt to access beyond end of device [ 1380.162824] loop4: rw=34817, want=24, limit=14 [ 1380.164275] FAULT_INJECTION: forcing a failure. [ 1380.164275] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1380.164298] CPU: 1 PID: 9340 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1380.164310] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1380.164316] Call Trace: [ 1380.164342] dump_stack+0x107/0x167 [ 1380.164356] should_fail.cold+0x5/0xa [ 1380.164375] __alloc_pages_nodemask+0x182/0x680 [ 1380.164397] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1380.164408] ? xas_load+0x66/0x2c0 [ 1380.164434] ? find_get_entry+0x2d9/0x6e0 [ 1380.164467] alloc_pages_current+0x187/0x280 [ 1380.164492] __page_cache_alloc+0x2d2/0x360 [ 1380.164521] pagecache_get_page+0x2c7/0xc80 [ 1380.164552] block_truncate_page+0x199/0xab0 [ 1380.164578] ? fat_add_cluster+0x100/0x100 [ 1380.164601] ? selinux_inode_setattr+0x217/0x2e0 [ 1380.164622] ? block_write_full_page+0x290/0x290 [ 1380.164644] ? inode_newsize_ok+0x18d/0x210 [ 1380.164665] ? setattr_prepare+0x135/0x7e0 [ 1380.164694] fat_setattr+0xa19/0xf40 [ 1380.164721] ? fat_free.isra.0+0x940/0x940 [ 1380.164742] notify_change+0xba2/0x1080 [ 1380.164774] do_truncate+0x134/0x1f0 [ 1380.164795] ? file_open_root+0x440/0x440 [ 1380.164813] ? __check_object_size+0x319/0x440 [ 1380.164846] ? security_inode_permission+0xcb/0x100 [ 1380.164876] vfs_truncate+0x45b/0x5e0 [ 1380.164904] do_sys_truncate.part.0+0x122/0x140 [ 1380.164924] ? vfs_truncate+0x5e0/0x5e0 [ 1380.164944] ? ksys_write+0x1a9/0x260 [ 1380.164979] __x64_sys_truncate+0x69/0xa0 [ 1380.165002] do_syscall_64+0x33/0x40 [ 1380.165026] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1380.165040] RIP: 0033:0x7f5ee866bb19 [ 1380.165062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1380.165074] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1380.165096] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1380.165109] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1380.165123] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1380.165136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1380.165149] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1380.219439] FAULT_INJECTION: forcing a failure. [ 1380.219439] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1380.220147] CPU: 0 PID: 9347 Comm: syz-executor.7 Not tainted 5.10.154 #1 [ 1380.220158] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1380.220164] Call Trace: [ 1380.220192] dump_stack+0x107/0x167 [ 1380.220221] should_fail.cold+0x5/0xa [ 1380.220247] _copy_to_user+0x2e/0x180 [ 1380.220275] simple_read_from_buffer+0xcc/0x160 [ 1380.220300] proc_fail_nth_read+0x198/0x230 [ 1380.220323] ? proc_sessionid_read+0x230/0x230 [ 1380.220341] ? security_file_permission+0x24e/0x570 [ 1380.220373] ? proc_sessionid_read+0x230/0x230 [ 1380.220392] vfs_read+0x228/0x580 [ 1380.220420] ksys_read+0x12d/0x260 [ 1380.220441] ? __ia32_sys_pwrite64+0x230/0x230 [ 1380.220469] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1380.220496] do_syscall_64+0x33/0x40 [ 1380.220517] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1380.220530] RIP: 0033:0x7fc65ccc569c [ 1380.220549] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1380.220560] RSP: 002b:00007fc65a288170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1380.220582] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 00007fc65ccc569c [ 1380.220593] RDX: 000000000000000f RSI: 00007fc65a2881e0 RDI: 0000000000000005 [ 1380.220604] RBP: 00007fc65a2881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1380.220615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1380.220626] R13: 00007ffe29f2788f R14: 00007fc65a288300 R15: 0000000000022000 [ 1380.227703] attempt to access beyond end of device [ 1380.227703] loop5: rw=2049, want=24, limit=14 [ 1380.252036] attempt to access beyond end of device [ 1380.252036] loop5: rw=1, want=21, limit=14 07:06:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x3, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:06:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) r1 = openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x101180, 0x1e4) flock(r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000100000eaffffff001500"/109], 0x78) close(r0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {0x1b}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f00000002c0)=[0x6, 0x800]) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8914, &(0x7f0000000140)={'lo\x00'}) fchdir(r5) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x8, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@mmap}, {@access_any}, {@cache_none}], [{@uid_gt={'uid>', 0xee00}}, {@fsmagic={'fsmagic', 0x3d, 0xffff}}]}}) 07:06:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x7ffffff2, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:06:50 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:06:50 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 5) 07:06:50 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0xec0, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:06:50 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:50 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1392.640942] attempt to access beyond end of device [ 1392.640942] loop4: rw=2049, want=148, limit=14 [ 1392.642691] attempt to access beyond end of device [ 1392.642691] loop5: rw=2049, want=24, limit=14 [ 1392.645741] attempt to access beyond end of device [ 1392.645741] loop4: rw=34817, want=24, limit=14 [ 1392.647326] FAULT_INJECTION: forcing a failure. [ 1392.647326] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.647348] CPU: 1 PID: 9369 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1392.647362] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1392.647369] Call Trace: [ 1392.647391] dump_stack+0x107/0x167 [ 1392.647405] should_fail.cold+0x5/0xa [ 1392.647419] ? create_object.isra.0+0x3a/0xa20 [ 1392.647432] should_failslab+0x5/0x20 [ 1392.647443] kmem_cache_alloc+0x5b/0x360 [ 1392.647462] create_object.isra.0+0x3a/0xa20 [ 1392.647484] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1392.647513] kmem_cache_alloc+0x159/0x360 [ 1392.647546] alloc_buffer_head+0x20/0x110 [ 1392.647570] alloc_page_buffers+0x14d/0x6d0 [ 1392.647598] create_empty_buffers+0x2c/0x640 [ 1392.647628] block_truncate_page+0x76c/0xab0 [ 1392.647654] ? fat_add_cluster+0x100/0x100 [ 1392.647677] ? selinux_inode_setattr+0x217/0x2e0 [ 1392.647698] ? block_write_full_page+0x290/0x290 [ 1392.647720] ? inode_newsize_ok+0x18d/0x210 [ 1392.647741] ? setattr_prepare+0x135/0x7e0 [ 1392.647769] fat_setattr+0xa19/0xf40 [ 1392.647797] ? fat_free.isra.0+0x940/0x940 [ 1392.647816] notify_change+0xba2/0x1080 [ 1392.647848] do_truncate+0x134/0x1f0 [ 1392.647868] ? file_open_root+0x440/0x440 [ 1392.647888] ? __check_object_size+0x319/0x440 [ 1392.647923] ? security_inode_permission+0xcb/0x100 [ 1392.647952] vfs_truncate+0x45b/0x5e0 [ 1392.647980] do_sys_truncate.part.0+0x122/0x140 [ 1392.648000] ? vfs_truncate+0x5e0/0x5e0 [ 1392.648019] ? ksys_write+0x1a9/0x260 [ 1392.648052] __x64_sys_truncate+0x69/0xa0 [ 1392.648075] do_syscall_64+0x33/0x40 [ 1392.648098] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1392.648112] RIP: 0033:0x7f5ee866bb19 [ 1392.648134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1392.648146] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1392.648168] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1392.648181] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1392.648194] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1392.648208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1392.648221] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1392.648568] attempt to access beyond end of device [ 1392.648568] loop4: rw=0, want=21, limit=14 07:06:51 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 6) 07:06:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x7ffffff9, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:06:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x33fe0, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:06:51 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x4, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:06:51 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:06:51 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:06:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) [ 1392.823116] attempt to access beyond end of device [ 1392.823116] loop5: rw=1, want=21, limit=14 [ 1392.900081] attempt to access beyond end of device [ 1392.900081] loop4: rw=2049, want=148, limit=14 [ 1392.904934] attempt to access beyond end of device [ 1392.904934] loop4: rw=34817, want=24, limit=14 [ 1392.911291] FAULT_INJECTION: forcing a failure. [ 1392.911291] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.911318] CPU: 0 PID: 9394 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1392.911333] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1392.911341] Call Trace: [ 1392.911372] dump_stack+0x107/0x167 [ 1392.911405] should_fail.cold+0x5/0xa [ 1392.911432] ? create_object.isra.0+0x3a/0xa20 [ 1392.911456] should_failslab+0x5/0x20 [ 1392.911476] kmem_cache_alloc+0x5b/0x360 [ 1392.911506] create_object.isra.0+0x3a/0xa20 [ 1392.911533] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1392.911568] kmem_cache_alloc+0x159/0x360 [ 1392.911611] alloc_buffer_head+0x20/0x110 [ 1392.911641] alloc_page_buffers+0x14d/0x6d0 [ 1392.911682] create_empty_buffers+0x2c/0x640 [ 1392.911721] block_truncate_page+0x76c/0xab0 [ 1392.911753] ? fat_add_cluster+0x100/0x100 [ 1392.911781] ? selinux_inode_setattr+0x217/0x2e0 [ 1392.911808] ? block_write_full_page+0x290/0x290 [ 1392.911835] ? inode_newsize_ok+0x18d/0x210 [ 1392.911862] ? setattr_prepare+0x135/0x7e0 [ 1392.911898] fat_setattr+0xa19/0xf40 [ 1392.911934] ? fat_free.isra.0+0x940/0x940 [ 1392.911959] notify_change+0xba2/0x1080 [ 1392.912002] do_truncate+0x134/0x1f0 [ 1392.912029] ? file_open_root+0x440/0x440 [ 1392.912053] ? __check_object_size+0x319/0x440 [ 1392.912100] ? security_inode_permission+0xcb/0x100 [ 1392.912142] vfs_truncate+0x45b/0x5e0 [ 1392.912180] do_sys_truncate.part.0+0x122/0x140 [ 1392.912205] ? vfs_truncate+0x5e0/0x5e0 [ 1392.912230] ? ksys_write+0x1a9/0x260 [ 1392.912278] __x64_sys_truncate+0x69/0xa0 [ 1392.912306] do_syscall_64+0x33/0x40 [ 1392.912334] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1392.912352] RIP: 0033:0x7f5ee866bb19 [ 1392.912379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1392.912395] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1392.912424] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1392.912441] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1392.912457] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1392.912473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1392.912489] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1392.921340] attempt to access beyond end of device [ 1392.921340] loop4: rw=0, want=21, limit=14 [ 1392.956798] attempt to access beyond end of device [ 1392.956798] loop5: rw=2049, want=24, limit=14 [ 1392.987274] attempt to access beyond end of device [ 1392.987274] loop5: rw=1, want=21, limit=14 07:07:04 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x20001924, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:07:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x5, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:07:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:07:04 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:07:04 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 7) 07:07:04 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:04 executing program 1: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private0, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) r5 = getegid() setresgid(r5, r5, 0x0) r6 = getegid() setresgid(r6, r6, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010001000000000002000300", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="02000300", @ANYRES32=r1, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=r2, @ANYBLOB="02000200", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=0xee00, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="040006000000000008000100", @ANYRES32=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="10000700000000002000010000000000"], 0x7c, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x7}}, 0x1c) setresgid(0x0, 0x0, 0x0) setregid(0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000004700)=0xa10, 0x4) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/cpuset.cpus/file0\x00', 0x300, 0x0) sendfile(0xffffffffffffffff, r7, 0x0, 0x800) 07:07:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x7ffff000, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:07:04 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:04 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0xfffffdef, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:07:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x6, 0x5) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) openat(r0, &(0x7f00000000c0)='./file0\x00', 0xb4600, 0x8) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@v3={0x3000000, [{0x2, 0x3f}, {0x3f800000, 0x1}], 0xee00}, 0x18, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000240)) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x4ff}, 0x491, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000140)) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x2, 0x5c, 0x14}, 0x18) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0xfffff000, @mcast1, 0x2}, 0xfffffffffffffd5b) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) recvmmsg(r3, &(0x7f0000000000), 0x0, 0x80000040, 0x0) 07:07:04 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:04 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:07:04 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 8) [ 1406.146061] attempt to access beyond end of device [ 1406.146061] loop5: rw=2049, want=24, limit=14 [ 1406.174965] attempt to access beyond end of device [ 1406.174965] loop4: rw=2049, want=148, limit=14 [ 1406.198778] attempt to access beyond end of device [ 1406.198778] loop4: rw=34817, want=24, limit=14 [ 1406.201427] FAULT_INJECTION: forcing a failure. [ 1406.201427] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.201439] CPU: 1 PID: 9434 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1406.201445] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1406.201448] Call Trace: [ 1406.201466] dump_stack+0x107/0x167 [ 1406.201480] should_fail.cold+0x5/0xa [ 1406.201492] ? create_object.isra.0+0x3a/0xa20 [ 1406.201505] should_failslab+0x5/0x20 [ 1406.201516] kmem_cache_alloc+0x5b/0x360 [ 1406.201530] create_object.isra.0+0x3a/0xa20 [ 1406.201541] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1406.201555] kmem_cache_alloc+0x159/0x360 [ 1406.201572] alloc_buffer_head+0x20/0x110 [ 1406.201584] alloc_page_buffers+0x14d/0x6d0 [ 1406.201600] create_empty_buffers+0x2c/0x640 [ 1406.201615] block_truncate_page+0x76c/0xab0 [ 1406.201629] ? fat_add_cluster+0x100/0x100 [ 1406.201641] ? selinux_inode_setattr+0x217/0x2e0 [ 1406.201651] ? block_write_full_page+0x290/0x290 [ 1406.201662] ? inode_newsize_ok+0x18d/0x210 [ 1406.201672] ? setattr_prepare+0x135/0x7e0 [ 1406.201687] fat_setattr+0xa19/0xf40 [ 1406.201701] ? fat_free.isra.0+0x940/0x940 [ 1406.201710] notify_change+0xba2/0x1080 [ 1406.201727] do_truncate+0x134/0x1f0 [ 1406.201737] ? file_open_root+0x440/0x440 [ 1406.201746] ? __check_object_size+0x319/0x440 [ 1406.201765] ? security_inode_permission+0xcb/0x100 [ 1406.201781] vfs_truncate+0x45b/0x5e0 [ 1406.201796] do_sys_truncate.part.0+0x122/0x140 [ 1406.201805] ? vfs_truncate+0x5e0/0x5e0 [ 1406.201815] ? ksys_write+0x1a9/0x260 [ 1406.201833] __x64_sys_truncate+0x69/0xa0 [ 1406.201845] do_syscall_64+0x33/0x40 [ 1406.201857] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1406.201864] RIP: 0033:0x7f5ee866bb19 [ 1406.201875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1406.201880] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1406.201892] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1406.201898] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1406.201904] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1406.201910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1406.201916] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1406.202022] attempt to access beyond end of device [ 1406.202022] loop4: rw=0, want=21, limit=14 [ 1406.212138] attempt to access beyond end of device [ 1406.212138] loop5: rw=1, want=21, limit=14 [ 1406.392354] attempt to access beyond end of device [ 1406.392354] loop4: rw=2049, want=148, limit=14 [ 1406.393215] attempt to access beyond end of device [ 1406.393215] loop4: rw=34817, want=24, limit=14 [ 1406.394902] FAULT_INJECTION: forcing a failure. [ 1406.394902] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.394914] CPU: 1 PID: 9460 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1406.394919] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1406.394923] Call Trace: [ 1406.394939] dump_stack+0x107/0x167 [ 1406.394953] should_fail.cold+0x5/0xa [ 1406.394966] ? create_object.isra.0+0x3a/0xa20 [ 1406.394978] should_failslab+0x5/0x20 [ 1406.394989] kmem_cache_alloc+0x5b/0x360 [ 1406.395004] create_object.isra.0+0x3a/0xa20 [ 1406.395014] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1406.395028] kmem_cache_alloc+0x159/0x360 [ 1406.395046] alloc_buffer_head+0x20/0x110 [ 1406.395057] alloc_page_buffers+0x14d/0x6d0 [ 1406.395073] create_empty_buffers+0x2c/0x640 [ 1406.395088] block_truncate_page+0x76c/0xab0 [ 1406.395102] ? fat_add_cluster+0x100/0x100 [ 1406.395114] ? selinux_inode_setattr+0x217/0x2e0 [ 1406.395124] ? block_write_full_page+0x290/0x290 [ 1406.395135] ? inode_newsize_ok+0x18d/0x210 [ 1406.395145] ? setattr_prepare+0x135/0x7e0 [ 1406.395159] fat_setattr+0xa19/0xf40 [ 1406.395173] ? fat_free.isra.0+0x940/0x940 [ 1406.395182] notify_change+0xba2/0x1080 [ 1406.395199] do_truncate+0x134/0x1f0 [ 1406.395209] ? file_open_root+0x440/0x440 [ 1406.395218] ? __check_object_size+0x319/0x440 [ 1406.395237] ? security_inode_permission+0xcb/0x100 [ 1406.395253] vfs_truncate+0x45b/0x5e0 [ 1406.395268] do_sys_truncate.part.0+0x122/0x140 [ 1406.395277] ? vfs_truncate+0x5e0/0x5e0 [ 1406.395287] ? ksys_write+0x1a9/0x260 [ 1406.395306] __x64_sys_truncate+0x69/0xa0 [ 1406.395318] do_syscall_64+0x33/0x40 [ 1406.395329] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1406.395337] RIP: 0033:0x7f5ee866bb19 [ 1406.395347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1406.395353] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1406.395365] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1406.395371] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1406.395377] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1406.395383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1406.395393] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1406.397828] attempt to access beyond end of device [ 1406.397828] loop4: rw=0, want=21, limit=14 07:07:17 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f"]}, 0x18}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x6, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:07:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) read(r0, &(0x7f0000000040)=""/238, 0xee) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x14, 0x4a, 0xc21, 0x0, 0x0, {0xa, 0x0, 0x2}}, 0x14}}, 0x0) 07:07:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:07:17 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:17 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:07:17 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 9) 07:07:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x3, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:07:17 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f"]}, 0x18}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x2, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:07:17 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x8, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:17 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 10) 07:07:17 executing program 1: ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/243) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file1\x00') ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0xfdef) fallocate(r0, 0x3, 0x0, 0x8000) 07:07:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x3, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:07:18 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:07:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x4, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:07:18 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1419.510914] attempt to access beyond end of device [ 1419.510914] loop5: rw=2049, want=24, limit=14 [ 1419.512524] attempt to access beyond end of device [ 1419.512524] loop4: rw=2049, want=148, limit=14 [ 1419.517523] attempt to access beyond end of device [ 1419.517523] loop4: rw=34817, want=24, limit=14 [ 1419.518070] FAULT_INJECTION: forcing a failure. [ 1419.518070] name failslab, interval 1, probability 0, space 0, times 0 [ 1419.518082] CPU: 0 PID: 9482 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1419.518088] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1419.518091] Call Trace: [ 1419.518109] dump_stack+0x107/0x167 [ 1419.518123] should_fail.cold+0x5/0xa [ 1419.518136] ? create_object.isra.0+0x3a/0xa20 [ 1419.518149] should_failslab+0x5/0x20 [ 1419.518160] kmem_cache_alloc+0x5b/0x360 [ 1419.518175] create_object.isra.0+0x3a/0xa20 [ 1419.518185] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1419.518199] kmem_cache_alloc+0x159/0x360 [ 1419.518221] alloc_buffer_head+0x20/0x110 [ 1419.518232] alloc_page_buffers+0x14d/0x6d0 [ 1419.518249] create_empty_buffers+0x2c/0x640 [ 1419.518264] block_truncate_page+0x76c/0xab0 [ 1419.518278] ? fat_add_cluster+0x100/0x100 [ 1419.518290] ? selinux_inode_setattr+0x217/0x2e0 [ 1419.518300] ? block_write_full_page+0x290/0x290 [ 1419.518311] ? inode_newsize_ok+0x18d/0x210 [ 1419.518321] ? setattr_prepare+0x135/0x7e0 [ 1419.518335] fat_setattr+0xa19/0xf40 [ 1419.518349] ? fat_free.isra.0+0x940/0x940 [ 1419.518359] notify_change+0xba2/0x1080 [ 1419.518377] do_truncate+0x134/0x1f0 [ 1419.518387] ? file_open_root+0x440/0x440 [ 1419.518396] ? __check_object_size+0x319/0x440 [ 1419.518415] ? security_inode_permission+0xcb/0x100 [ 1419.518431] vfs_truncate+0x45b/0x5e0 [ 1419.518448] do_sys_truncate.part.0+0x122/0x140 [ 1419.518457] ? vfs_truncate+0x5e0/0x5e0 [ 1419.518469] ? ksys_write+0x1a9/0x260 [ 1419.518488] __x64_sys_truncate+0x69/0xa0 [ 1419.518500] do_syscall_64+0x33/0x40 [ 1419.518511] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1419.518519] RIP: 0033:0x7f5ee866bb19 [ 1419.518529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1419.518535] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1419.518547] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1419.518554] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1419.518559] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1419.518566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1419.518572] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1419.521020] attempt to access beyond end of device [ 1419.521020] loop4: rw=0, want=21, limit=14 [ 1419.628261] attempt to access beyond end of device [ 1419.628261] loop5: rw=1, want=21, limit=14 [ 1419.676236] attempt to access beyond end of device [ 1419.676236] loop5: rw=2049, want=24, limit=14 [ 1419.693246] attempt to access beyond end of device [ 1419.693246] loop5: rw=1, want=21, limit=14 [ 1419.732972] attempt to access beyond end of device [ 1419.732972] loop4: rw=2049, want=148, limit=14 [ 1419.749916] attempt to access beyond end of device [ 1419.749916] loop4: rw=34817, want=24, limit=14 [ 1419.759684] FAULT_INJECTION: forcing a failure. [ 1419.759684] name failslab, interval 1, probability 0, space 0, times 0 [ 1419.759706] CPU: 1 PID: 9496 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1419.759717] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1419.759724] Call Trace: [ 1419.759751] dump_stack+0x107/0x167 [ 1419.759778] should_fail.cold+0x5/0xa [ 1419.759806] ? create_object.isra.0+0x3a/0xa20 [ 1419.759830] should_failslab+0x5/0x20 [ 1419.759850] kmem_cache_alloc+0x5b/0x360 [ 1419.759879] create_object.isra.0+0x3a/0xa20 [ 1419.759899] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1419.759928] kmem_cache_alloc+0x159/0x360 [ 1419.759962] alloc_buffer_head+0x20/0x110 [ 1419.759985] alloc_page_buffers+0x14d/0x6d0 [ 1419.760015] create_empty_buffers+0x2c/0x640 [ 1419.760046] block_truncate_page+0x76c/0xab0 [ 1419.760072] ? fat_add_cluster+0x100/0x100 [ 1419.760094] ? selinux_inode_setattr+0x217/0x2e0 [ 1419.760113] ? block_write_full_page+0x290/0x290 [ 1419.760135] ? inode_newsize_ok+0x18d/0x210 [ 1419.760155] ? setattr_prepare+0x135/0x7e0 [ 1419.760183] fat_setattr+0xa19/0xf40 [ 1419.760211] ? fat_free.isra.0+0x940/0x940 [ 1419.760230] notify_change+0xba2/0x1080 [ 1419.760263] do_truncate+0x134/0x1f0 [ 1419.760283] ? file_open_root+0x440/0x440 [ 1419.760301] ? __check_object_size+0x319/0x440 [ 1419.760338] ? security_inode_permission+0xcb/0x100 [ 1419.760370] vfs_truncate+0x45b/0x5e0 [ 1419.760399] do_sys_truncate.part.0+0x122/0x140 [ 1419.760418] ? vfs_truncate+0x5e0/0x5e0 [ 1419.760436] ? ksys_write+0x1a9/0x260 [ 1419.760473] __x64_sys_truncate+0x69/0xa0 [ 1419.760496] do_syscall_64+0x33/0x40 [ 1419.760518] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1419.760532] RIP: 0033:0x7f5ee866bb19 [ 1419.760552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1419.760563] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1419.760586] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1419.760598] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1419.760610] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1419.760622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1419.760634] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1419.770173] attempt to access beyond end of device [ 1419.770173] loop4: rw=0, want=21, limit=14 07:07:32 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xa, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:32 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f"]}, 0x18}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:32 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 11) 07:07:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x7, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:07:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x4, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:07:32 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x4000000010000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:07:32 executing program 1: semctl$SEM_INFO(0xffffffffffffffff, 0x4, 0x13, &(0x7f00000000c0)=""/133) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7569643589b7205241537c422ea872c9e4efc8e90b820ef3b884ec0a5e1cb32f502d", @ANYRESHEX, @ANYBLOB=',\x00']) 07:07:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x5, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:07:33 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:33 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x2, &(0x7f0000000080)=0x8, 0x4) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)="3e3fc2db0956", 0x6}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002a00274e00000000000000002c998d7cf12f95c68af60fed7174ac30000000000400000009000080999e00009c0000002d5273f77c2cd9f074781af3f906e14423d16fa72511e64ae0d75106f8f95a8fdb7ba2b631c63471e2d982aa00645c3572663c6eeef61e52e8784d"], 0x24}}, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/170, 0xaa}], 0x1) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/29, 0x1d}, {&(0x7f0000000040)=""/193, 0xc1}], 0x2) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e24, 0x2, @mcast1, 0x9}, 0x1c) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r1) ioctl$FICLONE(r2, 0x40049409, r3) ftruncate(0xffffffffffffffff, 0x1000003) acct(0x0) unshare(0x48020200) 07:07:33 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x6, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:07:33 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x4000000010000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:07:33 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:33 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 12) 07:07:33 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x7, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1434.645304] tmpfs: Unknown parameter 'uid5‰· RAS|B.¨rÉäïÈé ‚ó¸„ì [ 1434.645304] ^³/P-0xffffffffffffffff' [ 1434.723744] handle_bad_sector: 2 callbacks suppressed [ 1434.723755] attempt to access beyond end of device [ 1434.723755] loop5: rw=2049, want=24, limit=14 [ 1434.777805] attempt to access beyond end of device [ 1434.777805] loop4: rw=2049, want=148, limit=14 [ 1434.786782] attempt to access beyond end of device [ 1434.786782] loop4: rw=34817, want=24, limit=14 [ 1434.791210] FAULT_INJECTION: forcing a failure. [ 1434.791210] name failslab, interval 1, probability 0, space 0, times 0 [ 1434.791231] CPU: 1 PID: 9542 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1434.791242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1434.791248] Call Trace: [ 1434.791275] dump_stack+0x107/0x167 [ 1434.791301] should_fail.cold+0x5/0xa [ 1434.791323] ? create_object.isra.0+0x3a/0xa20 [ 1434.791346] should_failslab+0x5/0x20 [ 1434.791365] kmem_cache_alloc+0x5b/0x360 [ 1434.791400] create_object.isra.0+0x3a/0xa20 [ 1434.791421] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1434.791449] kmem_cache_alloc+0x159/0x360 [ 1434.791482] alloc_buffer_head+0x20/0x110 [ 1434.791504] alloc_page_buffers+0x14d/0x6d0 [ 1434.791535] create_empty_buffers+0x2c/0x640 [ 1434.791565] block_truncate_page+0x76c/0xab0 [ 1434.791590] ? fat_add_cluster+0x100/0x100 [ 1434.791612] ? selinux_inode_setattr+0x217/0x2e0 [ 1434.791631] ? block_write_full_page+0x290/0x290 [ 1434.791652] ? inode_newsize_ok+0x18d/0x210 [ 1434.791672] ? setattr_prepare+0x135/0x7e0 [ 1434.791701] fat_setattr+0xa19/0xf40 [ 1434.791728] ? fat_free.isra.0+0x940/0x940 [ 1434.791746] notify_change+0xba2/0x1080 [ 1434.791780] do_truncate+0x134/0x1f0 [ 1434.791799] ? file_open_root+0x440/0x440 [ 1434.791816] ? __check_object_size+0x319/0x440 [ 1434.791853] ? security_inode_permission+0xcb/0x100 [ 1434.791885] vfs_truncate+0x45b/0x5e0 [ 1434.791914] do_sys_truncate.part.0+0x122/0x140 [ 1434.791933] ? vfs_truncate+0x5e0/0x5e0 [ 1434.791950] ? ksys_write+0x1a9/0x260 [ 1434.791987] __x64_sys_truncate+0x69/0xa0 [ 1434.792010] do_syscall_64+0x33/0x40 [ 1434.792031] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1434.792045] RIP: 0033:0x7f5ee866bb19 [ 1434.792065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1434.792076] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1434.792099] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1434.792111] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1434.792122] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1434.792134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1434.792146] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1434.800470] attempt to access beyond end of device [ 1434.800470] loop4: rw=0, want=21, limit=14 [ 1434.815810] attempt to access beyond end of device [ 1434.815810] loop5: rw=1, want=21, limit=14 [ 1434.905113] attempt to access beyond end of device [ 1434.905113] loop5: rw=2049, want=24, limit=14 [ 1434.972616] attempt to access beyond end of device [ 1434.972616] loop5: rw=1, want=21, limit=14 [ 1435.067834] FAULT_INJECTION: forcing a failure. [ 1435.067834] name failslab, interval 1, probability 0, space 0, times 0 [ 1435.067969] CPU: 1 PID: 9571 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1435.067980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1435.067987] Call Trace: [ 1435.068015] dump_stack+0x107/0x167 [ 1435.068042] should_fail.cold+0x5/0xa [ 1435.068066] ? create_object.isra.0+0x3a/0xa20 [ 1435.068091] should_failslab+0x5/0x20 [ 1435.068111] kmem_cache_alloc+0x5b/0x360 [ 1435.068130] ? __kasan_slab_free+0x122/0x160 [ 1435.068159] create_object.isra.0+0x3a/0xa20 [ 1435.068180] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1435.068209] __kmalloc+0x16e/0x3f0 [ 1435.068245] ext4_ext_remove_space+0x15af/0x4010 [ 1435.068284] ? find_held_lock+0x2c/0x110 [ 1435.068327] ? do_raw_write_lock+0x11a/0x280 [ 1435.068352] ? do_raw_read_unlock+0x70/0x70 [ 1435.068380] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 1435.068420] ? ext4_es_remove_extent+0x103/0x3f0 [ 1435.068443] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 1435.068473] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1435.068504] ext4_ext_truncate+0x1ea/0x250 [ 1435.068531] ext4_truncate+0xd5e/0x12b0 [ 1435.068550] ? unmap_mapping_pages+0x117/0x2a0 [ 1435.068579] ? ext4_punch_hole+0x1110/0x1110 [ 1435.068622] ext4_setattr+0x14c7/0x22c0 [ 1435.068641] ? current_time+0x1e6/0x2c0 [ 1435.068687] ? ext4_journalled_write_end+0x1240/0x1240 [ 1435.068708] notify_change+0xba2/0x1080 [ 1435.068744] do_truncate+0x134/0x1f0 [ 1435.068764] ? file_open_root+0x440/0x440 [ 1435.068783] ? security_capable+0x95/0xc0 [ 1435.068823] ? security_inode_permission+0xcb/0x100 [ 1435.068858] vfs_truncate+0x45b/0x5e0 [ 1435.068889] do_sys_truncate.part.0+0x122/0x140 [ 1435.068908] ? vfs_truncate+0x5e0/0x5e0 [ 1435.068927] ? ksys_write+0x1a9/0x260 [ 1435.068967] __x64_sys_truncate+0x69/0xa0 [ 1435.068991] do_syscall_64+0x33/0x40 [ 1435.069013] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1435.069026] RIP: 0033:0x7f5ee866bb19 [ 1435.069047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1435.069059] RSP: 002b:00007f5ee5bc0188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1435.069082] RAX: ffffffffffffffda RBX: 00007f5ee877f020 RCX: 00007f5ee866bb19 [ 1435.069095] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1435.069107] RBP: 00007f5ee5bc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1435.069119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1435.069131] R13: 00007fff7a9f79df R14: 00007f5ee5bc0300 R15: 0000000000022000 07:07:48 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:48 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x4000000010000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:07:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) ioctl$FICLONE(r0, 0x40049409, r0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) sendmsg$inet6(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="37604927cd2a307588e493e5fa366d347396dc333c8f9a4b72291bb29dba49361525664403489cb8625c74ececfde0fb9ffe463f3df3b2923b4026d33dfbbe76ad21a69a45e6c573a2a3984167bf2eff5c1a43915a4ee158c9fb28246f992a53d44d937306ae309655d4c98e0f35", 0x6e}, {&(0x7f0000000280)="4bb8a9683471caa5b31e3f4561e29f38d62020d1fbc850750c6f4954bb8f749a1fe32d0355b5ab1cbedef8d3e2aa46f48473b1aa05ba51e2b6c0d24279db9029f867afe649e18055ef578be0e7bea8fb8a80fafb5b7dc8fbdff6e1161915821255b3a27f43aaf2e74e0aa7b7ae6ad2bd86dabe58792d7f5df0fd5a5d60489fb05b2def959427835572ad0f9259ca0c6d65a67f35a79523be3d64b666fb5a2fe08ea7ad956ae9779fd63e8d3409a4e2217d8ef3ac17cc257c", 0xb8}, {&(0x7f0000000700)="e05222aa6cf0297a073903936fa47c0d78a5bbe573d342ba91cd143a52dac7bd5ece222c6e09d378efecf3215b05ea4c0557d498a61528b4884f4c5fea7205291be90de33079413358689fa185ff737ddc39b25b65626edf171776efa6845045b099e3be92dd188338141704c99b82bec11bad06b0a0af7c6760225e192a809b3a48ad69a1bb36ff387334", 0x8b}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vxcan0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x480400, 0x0) sendmmsg$inet6(r2, &(0x7f00000054c0)=[{{&(0x7f00000001c0)={0xa, 0x4e20, 0x2, @local, 0x1}, 0x1c, &(0x7f00000008c0)=[{&(0x7f0000000400)="7ec1cc778aaa4069f6b324f8951b46d282d70310e3d73ff77ea9dfef0cb6e75794fb43a4b09ffee81accff4d23df3224f7f69f266bfa3aa13aacac4d3acf481df6c861116491eb835bf94dfa2e8bd814f11d01c1", 0x54}, {&(0x7f0000000380)="6a2aa7723f78e8cd4413", 0xa}, {&(0x7f0000000480)="0334d43b6668bdebb650ec5262cf7f7e88acb343935f39bf3ed248260941e32191aa358695eaaf32820c63a469f7f4c17ac4a4587e8a5a093d51f0fd4e7b578d63232b8b176f1b899046b54e594a3aa5f9983f5906583099df19e3d87b10e7807fe858565292fe6c8882f7bd084ecbc904abdb292ed3fcdf9288fd71e5011b47d342c311ca8755d45f3f5eb50185be90c9045249942881d309e726b5b29d261fe8dee69bc8d1a917d03531d8c0d649b43a3e254b193b11c6", 0xb8}, {&(0x7f0000000540)="c6fd0f10dfad2010b9235366e6979aab914fb0b3157d78da76da5806115da844b16cbe23d92dae2682e7cd34808c41e7466f5559499866cfab666c79c38f99dfa8a8b3effe", 0x45}, {&(0x7f00000005c0)="40b5dc42418fa9715def23fc439f9d6339e6ba028c92a4bd", 0x18}, {&(0x7f0000000600)="aa4ed3175cf249744cb02c9b91811efa7c6e1b6ea6198c79035a75e209471d9143636801fc52657547b93c35c74ca71add46c65ae50b78f3f99131bcec9d747a5dfe2f9c644b4187c81cd4cbcdf8c2e5c44108e12e524a8a479a0a5035a77cc31a0266a2796af8b378c63730ec91285b42e156acea081eacb78e599fd8772a988e52a35180bc0473a2b27b948cae3d59c512adb9ab0313c2649ccd9ae7effd6f5f75af2f170384fd552162ab02d600f8d1c0b1efe8256a8e9c796eccb6d943a1aa64a78453e5a02af5bc36791be37515cc", 0xd1}, {&(0x7f00000007c0)="ae1ae4d1521e56969566083bcce4f3d9cfc55f8b650eded66c617fabc4d2d57f7396e995cb4ef77600055933c8ade29e857d06e508266cc4c8b52d52f816480db9979ef5c2867f74b8884a7f0be00006f20112da7332e64df7fb651e52c8b2726b27f9d8b5c0a20979dabec8d3e17b9a954c7336dfafe21e0e4f6cf3f8e5aae3e0f7aa7a4707ee1cf1d739a50655ec3d67c33df9bdcaa76ef49f9e708495c60bfaf8f553bdb518272d3a0c7fe8a605823702773a3648d50fee32c1653e88ebe3ab8714340c82cc5f6d08bf24d944fa0510fe95122eec1fc457f03dc83964208a5946d681dd", 0xe5}], 0x7, &(0x7f0000000940)=[@dontfrag={{0x14, 0x29, 0x3e, 0x1}}, @rthdr={{0x88, 0x29, 0x39, {0x87, 0xe, 0x1, 0x0, 0x0, [@local, @remote, @remote, @dev={0xfe, 0x80, '\x00', 0x16}, @private1, @private2, @local]}}}, @rthdr={{0x68, 0x29, 0x39, {0x2e, 0xa, 0x1, 0xd8, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @remote, @remote, @mcast2, @ipv4={'\x00', '\xff\xff', @broadcast}]}}}], 0x108}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000a80)="b1753474502c25c46e90a064d3764ec767bb27dda4c8a347cfb1586e8c9d03ccc5f69faf541c9244cbb221033c194469136769fdbb0b737eded47c0775c271549f54c1211742cbfd07d5296cf62b73a2809e10d1b61421c39257f33d415432adb1b51130e2d3ec96c35d606e3c0cf9eadf74d555e9c6ae00eb8db0f570cb6704c2ac62ac1f636e24502eec0fdd51e04d9a582fed8366e22529585a88ddad393c556bd3b358cb9f069af451f94f48141896f045431bfd9650ed7c205f644ebc9b9243ac50ed54d5c6e9b6d15ab1d5", 0xce}, {&(0x7f0000000b80)="0c6b2746aee16ef7429438502ab7bc3b766cc59bc79e363a1ca9e75792b4fefdf99d6143503c62db0ca32487c9ea309f", 0x30}, {&(0x7f0000000bc0)="6171f1c978a3b58acbc92ddee994ea4a40bc840b73897472b6f1cde55dcdc363aa88bc7c169510e4d49a7bd93827754b7427f212b8629cb7cf8a11bb6a19c19dc569ee11045cda620f9c2f351c558213192d8ad9b69e731f2e7caae85b09e88fdd971427b59469cdb0743a7fa4ac1b3083ab865f02ea573823fdae0364ba339d28ca4149963701e7d520ad8613111856a4040e510548d86756e440fd3f7192d5f3d952208ced965445a855a730f40a4437ed92ab0093e9a4b604603c46d0fdc52cc1031888eff45a95ad24cc89c405128e753fb87171cb066633a1d90038cb8f018aa9e77ff5d8a7673c497c142bb435feff", 0xf2}], 0x3, &(0x7f0000000d00)=[@rthdr={{0x48, 0x29, 0x39, {0x21, 0x6, 0x0, 0x97, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback]}}}, @rthdr={{0x78, 0x29, 0x39, {0x3a, 0xc, 0x2, 0x63, 0x0, [@private1, @mcast1, @empty, @private1, @mcast1, @loopback]}}}, @rthdr={{0xa8, 0x29, 0x39, {0x84, 0x12, 0x2, 0x1, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast1}, @loopback, @private0={0xfc, 0x0, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x33}, @dev={0xfe, 0x80, '\x00', 0x21}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev={0xfe, 0x80, '\x00', 0x3c}, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x65}}, @flowinfo={{0x14, 0x29, 0xb, 0xa50}}], 0x198}}, {{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)="744ddad5322f986f0216262eb4cf92ca86c19b504348ea159de4777f2ad7a87755065d4225ec1723845509600126b0b0ee40b01b25e78cdbc2eea639e56525fdb2e678ec712476", 0x47}, {&(0x7f0000000f40)="e75d80a85847813c3130264ff5e3b0d23fda7eb554a0799fe8e8df0c009e06821de17a4273d857d205612aedb73838402d83ed1eb2441e16f95ea7c9a0fa9cc3a268ba63ad025e9e9778df5c346063ff062022c62c149681cac179a4dcf1e7e6f24ae6ed14ea2692981303dc561248f5e5ee73d4b51d6312310ead3040d7d5084fdceffdb087535374959b098fc44a65", 0x90}, {&(0x7f0000001000)="ba386363a2de67e6911515fef479eaf2d691e58d7827eb8fd0963f28a8b3aedcbe1e6223d0db2b6b7e5896ac4e7cf8754e13d87d91a25ce94b5d2348b9b5994ee34c3db2e2ca84df21dffe3d5378e14ddb4be2f7f9b37873a8979d83873f609924235fb353fae4b84db2ce255926a720bb85d384c6f891421529854d9fd8bfc5d78d9845c1aec3061a2847033cc0d52ec35da948aa93f22c16fa9349061507853146d3159da3022756aeba51c13022dd83cbd610a7dbfe71363edfb30d356e6f21964fdb5fd66207e0e7", 0xca}], 0x3, &(0x7f0000001140)=[@rthdrdstopts={{0x1e0, 0x29, 0x37, {0x3c, 0x38, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x3f}}, @calipso={0x7, 0x30, {0x2, 0xa, 0x1, 0x100, [0xffff, 0x47, 0xffff, 0x1ff, 0x10001]}}, @enc_lim={0x4, 0x1, 0x8}, @calipso={0x7, 0x28, {0x0, 0x8, 0xe0, 0x2f, [0xfffffffffffffff7, 0x5, 0x0, 0x800]}}, @pad1, @enc_lim={0x4, 0x1, 0xc6}, @generic={0x9, 0x4f, "1cb111b8e0e561904f5665b11138a2bee316627bd7b78f8be36d3d0fe7c0bf87ef95ac2ef4ea8c8a211d21b2d361e9fbee436c651eca02fa205e9b2ac1da842b9b73ce8d8f57a11459e011f10bf02f"}, @calipso={0x7, 0x10, {0x8741157ab963ba14, 0x2, 0x7, 0x8, [0x2]}}, @generic={0x1, 0xe1, "3513c5b9c9e9b33271a9f8fb158703817ebd89944c23e733d8709a6bb517c769188b0c90fdb2fdc497b087bd72941c2b7d1578938b8bf716aa463858e128e884842303a3a25884defceaf12f70bc033f754fce7311d6fbcca2de66d52264627927bca9d8ebe64f7a62968ff771bf0c3b29fe8279cf8c5a2a29a7dee9dbfe801224b81d171e9d4878ffa6fd626ad54f2d54a448f538db3a2a5eef91b0a2ac905617d12dbe7f75beedd5b5a08fdb721848c4332ebe4b42274da0b35c005452689d1c040a59cde07effe730a34388ec134daf5afc498c312bf8964a6b3be2b431a37f"}]}}}, @dstopts_2292={{0x68, 0x29, 0x4, {0x33, 0x9, '\x00', [@calipso={0x7, 0x18, {0x1, 0x4, 0x95, 0x2, [0x7f, 0x4]}}, @calipso={0x7, 0x20, {0x0, 0x6, 0x79, 0xff65, [0x7e37, 0x80000000, 0xfffffffffffffffb]}}, @jumbo={0xc2, 0x4, 0x7fff}, @enc_lim={0x4, 0x1, 0x7f}, @ra={0x5, 0x2, 0x401}, @ra={0x5, 0x2, 0xaa}]}}}, @hopopts={{0x70, 0x29, 0x36, {0x11, 0xa, '\x00', [@padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x20, {0x3, 0x6, 0x5, 0x7fff, [0x7, 0x8, 0x7]}}, @pad1, @jumbo={0xc2, 0x4, 0x7d6f}, @calipso={0x7, 0x10, {0x0, 0x2, 0xf8, 0x7f, [0x5]}}, @ra={0x5, 0x2, 0xaf}, @jumbo={0xc2, 0x4, 0x6}, @pad1, @jumbo, @pad1]}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x32, 0x4, 0x2, 0x9, 0x0, [@local, @private2]}}}, @dstopts_2292={{0x1e8, 0x29, 0x4, {0x32, 0x39, '\x00', [@generic={0x40, 0x39, "3fa76d6c7d508e21201fcb4b32962f185c26a4dd97dda56496e6a743dfba133a6afd1a1bb178af5ca76f2febad016e1b7ef609ed01d26ce4aa"}, @ra={0x5, 0x2, 0x66}, @ra, @calipso={0x7, 0x18, {0x2, 0x4, 0x8, 0x4, [0x8, 0x400]}}, @generic={0x7, 0xbe, "e6d307f764e0e0dcb1e67808f446d6e9882eb8ba8fec2bdb8647a07242905b0ac272a6751913614a04dc0573b218736e15f4a4cf5edb8fef7e2b78e828b92f9a11750797dab177f0cc7aed4b1b1bc9eb0cac133d611690bedd9064dd4902fe03db2740974468378b675ddc657dfaf0ec460baff41409d4e068a35edb2ddb9a59b7a4a2d8d0dc1f2a4bd6843354a07af7c8939b6b1251c89e2913d7ec06a276597a3d309382f658a396b0ae901729836bed9075473f373e6993ab96d616be"}, @generic={0x0, 0xad, "8c1e827e091903cc1a9fc6ac078f808965eea4a99bd624bb0dd27b064a979f1269a7179e77565d2f84d0739b5e7189a8f9b753841f082f75953b43bb397837b4fc36f2a8cb96e1dcd619eaf0895293ba206556fbafb35d58026248c51d82aedef4dd3ec776b3b9179e9921037da453d93773c3c2e7990c9c6619afc1ab892dde084da68b008243b9c8d400a7e77b4c4df588d93c38fb6594754c56906d5aee7631ada8992358384ea6ee35f6a1"}, @padn]}}}], 0x4d8}}, {{&(0x7f0000001640)={0xa, 0x4e20, 0xc8000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x5}, 0x1c, &(0x7f0000003880)=[{&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000002680)="4dab942f23afbb161c1bba44a5d5534bf18bd93597c6df6881a9e274fc16bd511a29a8e75150fc93fec810b6fe89258310b922121bc2ad6dddc07e0b00cd9212fe2a16f6d72c974a5e6e4ff373e4bf3a56639b472b62d4d590ed8e06fec30798b15bb0aff74a2a839deb735b2bd02bca1151ead065dea074c1a51005d1cbc4301d57a7050413bcea94663547873046b3d5f9d21a672f6590012259ccf7", 0x9d}, {&(0x7f0000002740)="12c97b30dd9330906b8f048e8f858c2c4a809e9715b78975f77d6cd17dd3d033deec4b10c8a37d68ec2d4b366eff42f16ca1ad74750d742ba4cd5dd37381fad7f9a09678c44b52e2b7e5063f3f29a62054f86b05cc66fa21af9befb85748", 0x5e}, {&(0x7f00000027c0)="7421bfd49068d34bcb7502ba77e1a36c91420f5f91edadffdb3861e733ca9b2f47c28830401db28577927b5a62ac8e7461bc1611c3b20fcea86ca2a398c54489951bce8423c09cf2be1d1410d71a89b57998", 0x52}, {&(0x7f0000002840)="8f61fbd2999c58d1d619", 0xa}, {&(0x7f0000002880)="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", 0x1000}], 0x6, &(0x7f0000003900)=[@hopopts={{0x80, 0x29, 0x36, {0x84, 0xc, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x58, {0x2, 0x14, 0x7f, 0xff, [0x5, 0x51, 0x1, 0x9, 0x7fff, 0x9, 0xffffffff, 0xffffffff, 0x8, 0x6]}}]}}}, @rthdr={{0x88, 0x29, 0x39, {0x0, 0xe, 0x0, 0x1, 0x0, [@private2, @private2, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, @private2, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x8001}}, @hopopts={{0x30, 0x29, 0x36, {0x5e, 0x2, '\x00', [@ra={0x5, 0x2, 0x3}, @ra={0x5, 0x2, 0x2}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @tclass={{0x14, 0x29, 0x43, 0xfff}}, @dstopts_2292={{0x1048, 0x29, 0x4, {0x29, 0x205, '\x00', [@enc_lim={0x4, 0x1, 0x40}, @calipso={0x7, 0x10, {0x0, 0x2, 0x40, 0x2, [0x3]}}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, @ra={0x5, 0x2, 0x5c}, @generic={0x7, 0x1000, "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"}]}}}], 0x11b0}}, {{&(0x7f0000004ac0)={0xa, 0x4e23, 0x1, @remote, 0x2}, 0x1c, &(0x7f0000004d00)=[{&(0x7f0000004b00)="660bc03ad4113b46558e143ffb02aa52e774e5a11c10d0fcecaf3819b43300465b94bbe8607eca7ddbdfd961ff14a8d4d557662a11c4bc05cd55aa004ad86749dcec594583fca132a02254afdc7b571c290d464cfd85d0d89e3854103376a69c6b47066bfd3f3c445d", 0x69}, {&(0x7f0000004b80)="f03f4730641bbe091055225d6964654aa02b2497720db8f5726e96e5ddc88fef05758392d35305e90779a87e96b8e9455faa08652e17f00d259163f9", 0x3c}, {&(0x7f0000004bc0)="415e27661f1a3d3371befdd81269b48791d403a7cfdf900db70ea8561ba146f5ef9566a905f8afd36971415667d049a32b45905d4b2a5d19ec0b4bc7b6110f1bac4d450156f1b2fdeca2829c3cba9745a5882a7be8e0a01ba112de3b741f2af98127020e18a5d018aaa5d184373fee4c565bb987912784c822a4cad0b536c53f57188a44709288f8babd0ca349995a0a9b0f1bdbbc618e12fec0609e582fc7bb822d502ab98484cc5a6d9b9704debfd65b024ec3218b12ddb7e8e8f150598298253971b67aa87417d17410973f023dbbcf5f820925ea63add4633f55", 0xdc}, {&(0x7f0000004cc0)}], 0x4}}, {{0x0, 0x0, &(0x7f0000004f40)=[{&(0x7f0000004d40)="856bc26fd26a5df0200045376754755393ea9468eef70ac3005b1585d1d13bda968a9e939be9254892800d689e98a82168331cd67e9bc142e0dfe71acc425cb7a317c21d379131635920e825695eb22e8ed2680ebacb3b8d7e25210d6db56d5407663b626b6446bc58a0038f82a0bca96edf9452aca1", 0x76}, {&(0x7f0000004dc0)="82435109aa502afd3d6f50df8fa0accb9d20c317837847c97df5b732281b9d956365675f8c399463ce1a6ab2c0b6b05adb9c710e16735d7d43643caa4fed71c1119eb729294c8da39fd061563ea346d14cdaa7b6b990c445bea06ca9e1ed92f2fed25daca1ab9571b3fac8b8e4dd00919c4c593ab7120e635d77503f8e721edc9ebbe40857de7d508ebe982045230460f061aef93d30becfcbefbe10040b8045d0dcc08f847d829adfe71939c7964217118f8b2c6e3d82e10287decfdf46aa28cf714db0cefcc4e0724372f9db0526a82a7f", 0xd2}, {&(0x7f0000004ec0)="b4696f998930b31d6ffaf348265da9fb31053378d9e1b63861f477c484cb15d2e38444148bccc66548329899fe2af5a2baf9dcdf9e922abe0b86fe635747f8d989e137b44b17a6fa31e7a2bb32866d1d7b271a33ef360e99f86540c0a9f5c4aab697ad50", 0x64}], 0x3, &(0x7f0000004f80)=[@dontfrag={{0x14, 0x29, 0x3e, 0x400}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x33, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0xcf}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xe0000000}}, @hoplimit={{0x14, 0x29, 0x34, 0x6}}, @tclass={{0x14, 0x29, 0x43, 0x6}}, @dstopts_2292={{0xc8, 0x29, 0x4, {0x3c, 0x15, '\x00', [@pad1, @ra={0x5, 0x2, 0x1}, @calipso={0x7, 0x30, {0x2, 0xa, 0x8, 0x0, [0x10001, 0xffffffff, 0x2, 0x5, 0x9]}}, @hao={0xc9, 0x10, @empty}, @pad1, @jumbo={0xc2, 0x4, 0xffffffff}, @generic={0x3f, 0x55, "14e3ca56a0d22b84b00f8f6052c7cf0b892019db3d4b0142a616b299b37698750ee18465f72ef356d5b86071b4d682c8a891f53c7ebb736610da3ad531085c9a100d90fb387f8eb21e4ec5efc8e1c7d9c0fc62508c"}]}}}], 0x148}}, {{0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005100)="0ee3a727b6ebaddab2a6029dc39ec4232cf9b61c2dec01eb66e67e238955902df8fad183a9d85e8a088be09ce51f4b0afa8241a9024a27778a62ce16ab31febdfde9b346cb78242a66cf95ab812f0f7605efbc9188ab5edb08fab8a473833c072a1795913f3e782a6b60178b5f2f1628ded2a796990c7db63f44", 0x7a}, {&(0x7f0000005180)="1ed12bfd78fd0a85501e757fdb5ac3ed1108c7dd6b5ac6d3", 0x18}], 0x2, &(0x7f0000005200)=[@rthdrdstopts={{0x20, 0x29, 0x37, {0x2, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x9}]}}}], 0x20}}, {{&(0x7f0000005240)={0xa, 0x4e21, 0x172c, @mcast2, 0x7}, 0x1c, &(0x7f0000005340)=[{&(0x7f0000005280)="5a1a80b4e889b2b6279685b854b5790f1103b526e72dbe2220dc364b355209ee304df6c8ebacf1e59e2cb5b196ceaa05c4f01961a5905260d8f80e1230a0e9a4d7e21a", 0x43}, {&(0x7f0000005300)="1474df", 0x3}], 0x2, &(0x7f0000005380)=[@flowinfo={{0x14, 0x29, 0xb, 0x8}}, @rthdrdstopts={{0x28, 0x29, 0x37, {0x67, 0x1, '\x00', [@ra={0x5, 0x2, 0x3}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @dstopts={{0x38, 0x29, 0x37, {0x5c, 0x3, '\x00', [@pad1, @hao={0xc9, 0x10, @mcast1}, @jumbo={0xc2, 0x4, 0xe5}]}}}, @tclass={{0x14, 0x29, 0x43, 0x80000001}}, @hoplimit={{0x14, 0x29, 0x34, 0xffffff92}}, @dstopts_2292={{0x28, 0x29, 0x4, {0x89, 0x1, '\x00', [@ra={0x5, 0x2, 0x6}, @enc_lim={0x4, 0x1, 0x20}, @ra]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x10001}}, @rthdrdstopts={{0x28, 0x29, 0x37, {0x87, 0x1, '\x00', [@jumbo={0xc2, 0x4, 0xe04c}, @jumbo={0xc2, 0x4, 0x63ac}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}], 0x128}}], 0x8, 0x80) 07:07:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x5, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:07:48 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x8, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:07:48 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 13) 07:07:48 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x8, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:07:48 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x217, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:48 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x9, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:07:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000010000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:07:48 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:07:48 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 14) 07:07:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000180), 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x18000, 0x0, 0xd22}, 0x0, 0x0, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x80002, &(0x7f0000000640)=ANY=[]) creat(&(0x7f00000000c0)='./file0\x00', 0x1c8) [ 1450.045650] attempt to access beyond end of device [ 1450.045650] loop5: rw=2049, want=24, limit=14 [ 1450.104348] attempt to access beyond end of device [ 1450.104348] loop4: rw=2049, want=148, limit=14 [ 1450.114122] attempt to access beyond end of device [ 1450.114122] loop4: rw=34817, want=24, limit=14 [ 1450.129336] FAULT_INJECTION: forcing a failure. [ 1450.129336] name failslab, interval 1, probability 0, space 0, times 0 [ 1450.129357] CPU: 0 PID: 9590 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1450.129368] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1450.129374] Call Trace: [ 1450.129409] dump_stack+0x107/0x167 [ 1450.129434] should_fail.cold+0x5/0xa [ 1450.129455] ? mempool_alloc+0x148/0x360 [ 1450.129470] ? mempool_free_pages+0x20/0x20 [ 1450.129491] should_failslab+0x5/0x20 [ 1450.129509] kmem_cache_alloc+0x5b/0x360 [ 1450.129533] ? mempool_free_pages+0x20/0x20 [ 1450.129550] mempool_alloc+0x148/0x360 [ 1450.129577] ? mempool_resize+0x7d0/0x7d0 [ 1450.129604] ? perf_trace_lock+0xac/0x490 [ 1450.129645] bio_alloc_bioset+0x36e/0x600 [ 1450.129666] ? mark_held_locks+0x9e/0xe0 [ 1450.129686] ? bvec_alloc+0x2f0/0x2f0 [ 1450.129708] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1450.129730] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1450.129749] ? trace_hardirqs_on+0x5b/0x180 [ 1450.129780] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 1450.129809] ll_rw_block+0x1e7/0x230 [ 1450.129835] block_truncate_page+0x7d6/0xab0 [ 1450.129858] ? fat_add_cluster+0x100/0x100 [ 1450.129879] ? block_write_full_page+0x290/0x290 [ 1450.129899] ? inode_newsize_ok+0x18d/0x210 [ 1450.129917] ? setattr_prepare+0x135/0x7e0 [ 1450.129944] fat_setattr+0xa19/0xf40 [ 1450.129969] ? fat_free.isra.0+0x940/0x940 [ 1450.129986] notify_change+0xba2/0x1080 [ 1450.130018] do_truncate+0x134/0x1f0 [ 1450.130036] ? file_open_root+0x440/0x440 [ 1450.130052] ? __check_object_size+0x319/0x440 [ 1450.130087] ? security_inode_permission+0xcb/0x100 [ 1450.130117] vfs_truncate+0x45b/0x5e0 [ 1450.130144] do_sys_truncate.part.0+0x122/0x140 [ 1450.130161] ? vfs_truncate+0x5e0/0x5e0 [ 1450.130178] ? ksys_write+0x1a9/0x260 [ 1450.130213] __x64_sys_truncate+0x69/0xa0 [ 1450.130234] do_syscall_64+0x33/0x40 [ 1450.130254] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1450.130267] RIP: 0033:0x7f5ee866bb19 [ 1450.130286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1450.130296] RSP: 002b:00007f5ee5be1188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1450.130318] RAX: ffffffffffffffda RBX: 00007f5ee877ef60 RCX: 00007f5ee866bb19 [ 1450.130329] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1450.130339] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1450.130350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1450.130361] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1450.136203] attempt to access beyond end of device [ 1450.136203] loop4: rw=0, want=21, limit=14 [ 1450.152614] attempt to access beyond end of device [ 1450.152614] loop5: rw=1, want=21, limit=14 [ 1450.434581] FAULT_INJECTION: forcing a failure. [ 1450.434581] name failslab, interval 1, probability 0, space 0, times 0 [ 1450.434604] CPU: 1 PID: 9624 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1450.434615] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1450.434622] Call Trace: [ 1450.434648] dump_stack+0x107/0x167 [ 1450.434674] should_fail.cold+0x5/0xa [ 1450.434696] ? create_object.isra.0+0x3a/0xa20 [ 1450.434719] should_failslab+0x5/0x20 [ 1450.434738] kmem_cache_alloc+0x5b/0x360 [ 1450.434755] ? pagecache_get_page+0x243/0xc80 [ 1450.434782] create_object.isra.0+0x3a/0xa20 [ 1450.434802] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1450.434830] kmem_cache_alloc+0x159/0x360 [ 1450.434863] ext4_free_blocks+0x915/0x20f0 [ 1450.434916] ? ext4_mb_new_blocks+0x4890/0x4890 [ 1450.434933] ? _raw_read_unlock+0x1a/0x30 [ 1450.434954] ? jbd2_journal_extend+0x160/0x740 [ 1450.434993] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 1450.435033] ext4_ext_remove_space+0x1f7e/0x4010 [ 1450.435110] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 1450.435151] ? ext4_es_remove_extent+0x103/0x3f0 [ 1450.435172] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 1450.435200] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1450.435230] ext4_ext_truncate+0x1ea/0x250 [ 1450.435254] ext4_truncate+0xd5e/0x12b0 [ 1450.435273] ? unmap_mapping_pages+0x117/0x2a0 [ 1450.435301] ? ext4_punch_hole+0x1110/0x1110 [ 1450.435341] ext4_setattr+0x14c7/0x22c0 [ 1450.435359] ? current_time+0x1e6/0x2c0 [ 1450.435402] ? ext4_journalled_write_end+0x1240/0x1240 [ 1450.435422] notify_change+0xba2/0x1080 [ 1450.435460] do_truncate+0x134/0x1f0 [ 1450.435479] ? file_open_root+0x440/0x440 [ 1450.435497] ? security_capable+0x95/0xc0 [ 1450.435535] ? security_inode_permission+0xcb/0x100 [ 1450.435568] vfs_truncate+0x45b/0x5e0 [ 1450.435597] do_sys_truncate.part.0+0x122/0x140 [ 1450.435615] ? vfs_truncate+0x5e0/0x5e0 [ 1450.435633] ? ksys_write+0x1a9/0x260 [ 1450.435671] __x64_sys_truncate+0x69/0xa0 [ 1450.435693] do_syscall_64+0x33/0x40 [ 1450.435714] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1450.435727] RIP: 0033:0x7f5ee866bb19 [ 1450.435748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1450.435759] RSP: 002b:00007f5ee5bc0188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1450.435782] RAX: ffffffffffffffda RBX: 00007f5ee877f020 RCX: 00007f5ee866bb19 [ 1450.435794] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1450.435805] RBP: 00007f5ee5bc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1450.435817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1450.435829] R13: 00007fff7a9f79df R14: 00007f5ee5bc0300 R15: 0000000000022000 07:08:02 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000010000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xf, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:08:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x300, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:08:02 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:02 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 15) 07:08:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x6, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:08:02 executing program 1: syz_emit_ethernet(0xab, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @dev, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4305, 0xa, 0x2, [], "c0afd3517f9843bd83ca"}, {}, {}, {}, {}, {0x8, 0x6558, 0x0, "2e3684e881fccdd81749872420d4596bf2345789284f27d2595fcd6278ada8ce8952bd9ba7e6dc1447639c3eb8dec78e2b8565cb34000000000000"}}}}}}, 0x0) 07:08:02 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x300, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1464.170010] attempt to access beyond end of device [ 1464.170010] loop5: rw=2049, want=24, limit=14 07:08:02 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000010000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1464.192098] attempt to access beyond end of device [ 1464.192098] loop5: rw=1, want=21, limit=14 07:08:02 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xa00, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:02 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:02 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:02 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r2) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r2) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x4c, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}]}, 0x4c}}, 0x20000000) 07:08:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xf0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1464.248390] attempt to access beyond end of device [ 1464.248390] loop5: rw=2049, want=24, limit=14 [ 1464.296989] attempt to access beyond end of device [ 1464.296989] loop4: rw=2049, want=148, limit=14 [ 1464.319960] attempt to access beyond end of device [ 1464.319960] loop4: rw=34817, want=24, limit=14 [ 1464.329249] attempt to access beyond end of device [ 1464.329249] loop4: rw=0, want=21, limit=14 [ 1464.329308] FAULT_INJECTION: forcing a failure. [ 1464.329308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1464.329328] CPU: 0 PID: 9642 Comm: syz-executor.4 Not tainted 5.10.154 #1 [ 1464.329340] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1464.329346] Call Trace: [ 1464.329375] dump_stack+0x107/0x167 [ 1464.329407] should_fail.cold+0x5/0xa [ 1464.329436] _copy_to_user+0x2e/0x180 [ 1464.329465] simple_read_from_buffer+0xcc/0x160 [ 1464.329492] proc_fail_nth_read+0x198/0x230 [ 1464.329517] ? proc_sessionid_read+0x230/0x230 [ 1464.329538] ? security_file_permission+0x24e/0x570 [ 1464.329556] ? perf_trace_initcall_start+0x101/0x380 [ 1464.329589] ? proc_sessionid_read+0x230/0x230 [ 1464.329609] vfs_read+0x228/0x580 [ 1464.329640] ksys_read+0x12d/0x260 [ 1464.329663] ? __ia32_sys_pwrite64+0x230/0x230 [ 1464.329691] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1464.329715] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1464.329742] do_syscall_64+0x33/0x40 [ 1464.329764] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1464.329778] RIP: 0033:0x7f5ee861e69c [ 1464.329800] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1464.329811] RSP: 002b:00007f5ee5be1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1464.329835] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f5ee861e69c [ 1464.329848] RDX: 000000000000000f RSI: 00007f5ee5be11e0 RDI: 0000000000000008 [ 1464.329860] RBP: 00007f5ee5be11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1464.329871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1464.329884] R13: 00007fff7a9f79df R14: 00007f5ee5be1300 R15: 0000000000022000 [ 1464.385451] attempt to access beyond end of device [ 1464.385451] loop5: rw=1, want=21, limit=14 07:08:17 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:17 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x7, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:08:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x500, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:08:17 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xec0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:17 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x300, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:08:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, 0x0, 0x0) r1 = io_uring_setup(0x5b73, &(0x7f0000000080)={0x0, 0x80b6, 0x2, 0x0, 0x244}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ppoll(&(0x7f0000000140)=[{r1, 0x100}, {r2, 0x50f}, {r3, 0x2602}], 0x3, &(0x7f00000001c0)={r4, r5+10000000}, &(0x7f0000000200)={[0x8]}, 0x8) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:08:17 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x2) 07:08:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x480, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:08:17 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf00, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:17 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:17 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:17 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:17 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x300, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:08:17 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x10d5c2, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r2, 0xa0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000180)=@ccm_128={{0x303}, "86e3c53248b269cd", "76d1dbc7ac9c5e3ea14e5b9c0480cc0c", "6a08b132", "433fc8c7123e76c3"}, 0x28) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xec, 0x29, 0x100, 0x70bd29, 0x25dfdbfe, {0x16}, [@generic="cf41d74cf1ffe40e038c18994104be4603127e6091feedb6cb17013ad3ab573190743ae70a84a5de0fc40e884ca4b534c0bef645e39640348dc75020b3c78f58f65ac5a2173db4afba72293b26284454e0fdc9a89dbb", @typed={0x9, 0x32, 0x0, 0x0, @str='vfat\x00'}, @typed={0x8, 0x11, 0x0, 0x0, @uid}, @nested={0x65, 0x81, 0x0, 0x1, [@generic="7be26bd51292ec0b5f669eb31d221ccf9efe1f565205930778a02afb851f8771dca4d88c8650d6bc9691e516a9cab867d5860c04dd3d03d4580b5a8660e79ac9883e99ad23d6cba072", @typed={0x8, 0x7, 0x0, 0x0, @uid=r5}, @typed={0xe, 0x1c, 0x0, 0x0, @str='/dev/vcsa\x00'}]}, @generic="871b", @nested={0x4, 0x3e}]}, 0xec}, 0x1, 0x0, 0x0, 0x4008040}, 0x40) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x500, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1479.164207] attempt to access beyond end of device [ 1479.164207] loop4: rw=2049, want=148, limit=14 [ 1479.170090] attempt to access beyond end of device [ 1479.170090] loop4: rw=34817, want=24, limit=14 [ 1479.170644] attempt to access beyond end of device [ 1479.170644] loop4: rw=0, want=21, limit=14 [ 1479.258221] attempt to access beyond end of device [ 1479.258221] loop5: rw=2049, want=24, limit=14 [ 1479.266871] attempt to access beyond end of device [ 1479.266871] loop4: rw=2049, want=148, limit=14 [ 1479.272223] attempt to access beyond end of device [ 1479.272223] loop4: rw=34817, want=24, limit=14 [ 1479.275209] attempt to access beyond end of device [ 1479.275209] loop4: rw=0, want=21, limit=14 [ 1479.294536] attempt to access beyond end of device [ 1479.294536] loop4: rw=34817, want=24, limit=14 [ 1479.301822] attempt to access beyond end of device [ 1479.301822] loop4: rw=0, want=21, limit=14 [ 1479.345216] attempt to access beyond end of device [ 1479.345216] loop5: rw=1, want=21, limit=14 07:08:17 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:32 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x101a02, 0x2) 07:08:32 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x600, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:08:32 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x1702, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:32 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:32 executing program 1: sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x20, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x5}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4) r0 = creat(&(0x7f0000000000)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000180)) fcntl$setsig(r0, 0xa, 0x39) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 07:08:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x8, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:08:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x600, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1493.760609] handle_bad_sector: 5 callbacks suppressed [ 1493.760619] attempt to access beyond end of device [ 1493.760619] loop4: rw=2049, want=148, limit=14 07:08:32 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x700, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1493.765351] attempt to access beyond end of device [ 1493.765351] loop4: rw=34817, want=24, limit=14 [ 1493.766889] attempt to access beyond end of device [ 1493.766889] loop4: rw=0, want=21, limit=14 [ 1493.775711] attempt to access beyond end of device [ 1493.775711] loop4: rw=34817, want=148, limit=14 [ 1493.789099] attempt to access beyond end of device [ 1493.789099] loop4: rw=34817, want=24, limit=14 [ 1493.795210] attempt to access beyond end of device [ 1493.795210] loop4: rw=0, want=21, limit=14 [ 1493.886211] attempt to access beyond end of device [ 1493.886211] loop5: rw=2049, want=148, limit=14 07:08:32 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0x3ff, 0x4, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17, 0xfffffffffffffffd}, {0x0, 0x0, 0x14000000000}, {&(0x7f0000000180)="c2c7c3c0a3132e79eed8d2dd406c2c768c3a608f9de69e4bc156d70d7a5e4b4cf345feb5b755154d4cac00dd8d20af8c984274830e9031443dc8ff8e5ed88df31b154d0d16e27276074b", 0x4a, 0x6}, {&(0x7f0000000280)="0c7739a80d07f9b53ad914f94a20efd99237087a713a87033b2c1755f71031531a2c9b353a497947f6f069d36e5fadb12aa32dc4209a04278c54d813b35814b0c35ca88deeb32e2bc2a4669ee55a00c122c2e9f57d044bf417dbf13baabe28780c096cc07397e6b16c36fa35f31658082d0f55515730002c6551ca7cbcf0cc36ae199f061eae92b23eac088f2e025742537a06977d419af497855550db8db55d3382f594d909637ea936c48b774c8965adce5187294e105672f4712352a5f58496721bf134886960f85c78bb4f303bffd9de15c45da5", 0xd6, 0x40}], 0x800008, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES16, @ANYRESOCT]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:32 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:32 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x1f00, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:32 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:32 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x8100, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x900, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:08:32 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xc00e, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:32 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) (fail_nth: 1) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1493.942624] attempt to access beyond end of device [ 1493.942624] loop5: rw=1, want=21, limit=14 [ 1493.970700] FAT-fs (loop4): Unrecognized mount option "ÿÿÿÿÿÿÿÿ" or missing value [ 1494.138290] attempt to access beyond end of device [ 1494.138290] loop5: rw=2049, want=148, limit=14 07:08:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xf00, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1494.213577] attempt to access beyond end of device [ 1494.213577] loop5: rw=1, want=21, limit=14 [ 1494.240598] FAT-fs (loop4): Unrecognized mount option "ÿÿÿÿÿÿÿÿ" or missing value 07:08:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000000c0)="0200000003000000040000006a000f", 0xf, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x8, 0x80) 07:08:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x690, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:08:46 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:46 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:46 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x300, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:08:46 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:46 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x8004, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:08:46 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xf000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:08:46 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xff00, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:46 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:08:46 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'lo\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0)=0x3, 0x4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) recvfrom$inet6(r1, &(0x7f00000001c0)=""/204, 0xcc, 0x12020, &(0x7f00000002c0)={0xa, 0x4e21, 0xd73, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000180)=0x8000, 0x4) fsync(r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="abdceb0539003a99ad86f9d85407634ae0df2f766c56ea44093d6a96f4244732468aac3900ed716c800133e0fa2cff6ae329b7b962cd335818426f5d0b2c92c9f5c07d498dfa24ecfa150d24ebba93fe6dc7be81e899aa3e1e3a5193659f165e9c5028c86607b4b47ee93c7a4bfa876b7a71a84a261f08a8004ed1283e84e13740d069b65ab72b50f3e11ab630c93b6a9190ba14cc355307e671fb5e72834cce66e75989d784fb78548d5bd7f57f49053128ced1315f2aa9dc9744c7aa6f36"]) 07:08:46 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:46 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x6820c3, 0x10) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x13a) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:08:46 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1507.954964] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1507.962627] attempt to access beyond end of device [ 1507.962627] loop4: rw=2049, want=24, limit=14 [ 1507.973591] attempt to access beyond end of device [ 1507.973591] loop4: rw=2049, want=21, limit=14 [ 1507.981767] attempt to access beyond end of device [ 1507.981767] loop5: rw=2049, want=148, limit=14 [ 1508.028099] attempt to access beyond end of device [ 1508.028099] loop4: rw=1, want=21, limit=14 [ 1508.063198] attempt to access beyond end of device [ 1508.063198] loop5: rw=1, want=21, limit=14 [ 1508.152563] attempt to access beyond end of device [ 1508.152563] loop5: rw=2049, want=148, limit=14 [ 1508.193935] attempt to access beyond end of device [ 1508.193935] loop5: rw=1, want=21, limit=14 [ 1508.203747] attempt to access beyond end of device [ 1508.203747] loop4: rw=2049, want=24, limit=14 [ 1508.227077] attempt to access beyond end of device [ 1508.227077] loop4: rw=2049, want=21, limit=14 [ 1508.295483] attempt to access beyond end of device [ 1508.295483] loop5: rw=2049, want=148, limit=14 07:09:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x30000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:09:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x700, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:09:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x500, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:09:00 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1f3000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x40001, &(0x7f00000000c0)={'trans=unix,', {[{@mmap}, {@loose}, {@cache_mmap}, {@nodevmap}], [{@hash}, {@seclabel}]}}) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x8b082a, &(0x7f00000007c0)={[{@i_version}]}) 07:09:00 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r2, 0xa0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x6dc}}, './file1\x00'}) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, &(0x7f0000000180)={0x37349d52, {0x24, 0x6, 0xff, 0x7, 0x2}}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:09:00 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x34000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:00 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:09:00 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1522.354819] handle_bad_sector: 2 callbacks suppressed [ 1522.354834] attempt to access beyond end of device [ 1522.354834] loop5: rw=2049, want=148, limit=14 [ 1522.375550] attempt to access beyond end of device [ 1522.375550] loop5: rw=1, want=21, limit=14 [ 1522.450705] attempt to access beyond end of device [ 1522.450705] loop5: rw=2049, want=148, limit=14 [ 1522.516223] EXT4-fs (sda): re-mounted. Opts: i_version,,errors=continue 07:09:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x34000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1522.524441] attempt to access beyond end of device [ 1522.524441] loop4: rw=2049, want=148, limit=14 [ 1522.528624] attempt to access beyond end of device [ 1522.528624] loop4: rw=34817, want=24, limit=14 07:09:00 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1522.530392] attempt to access beyond end of device [ 1522.530392] loop4: rw=0, want=21, limit=14 [ 1522.593755] attempt to access beyond end of device [ 1522.593755] loop5: rw=1, want=21, limit=14 07:09:01 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x8, 0x8, 0x7f, 0x0, 0x0, 0x13, 0x8000, 0xf, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x200, 0x10000}, 0xa44, 0x3, 0x9, 0x0, 0x1d2, 0x7, 0xf852, 0x0, 0x3, 0x0, 0x1ff}, r1, 0x8, r0, 0x2) readahead(0xffffffffffffffff, 0x6, 0x2e) ftruncate(0xffffffffffffffff, 0x1000003) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) shutdown(r2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000280), 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) syz_open_dev$evdev(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r3, 0x1, 0x1c, &(0x7f0000000080)=""/97, &(0x7f0000000100)=0x61) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)={0x800005, 0xffffffff, 0x8000, 0x2, 0xfffffffb}) unshare(0x48020200) 07:09:01 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1535.825279] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:09:21 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x8, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x80000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:09:21 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @nested={0x4, 0x2}]}, 0x20}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r2, 0xa0) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x800, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x96890fec20fc382c}, 0x20000000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000100)={0x0, 0x68, &(0x7f00000002c0)={&(0x7f0000000080)={0x24, r3, 0x325, 0x0, 0x0, {{0x11}, {@void, @val={0x8}, @void}}}, 0x24}}, 0x0) 07:09:21 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x80000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x600, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:09:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x2000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:09:21 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = getegid() setresgid(r2, r2, 0x0) openat2(r0, &(0x7f0000000180)='./file2\x00', &(0x7f00000001c0)={0x42, 0x80, 0xa}, 0x18) lchown(&(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) openat(r4, &(0x7f0000000280)='./file2\x00', 0x101400, 0x18) copy_file_range(r3, 0x0, r1, 0x0, 0x4000000010000, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x335900, 0x7) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r6, 0x0, r5, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:09:21 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:09:21 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x400300, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1543.423143] attempt to access beyond end of device [ 1543.423143] loop4: rw=2049, want=148, limit=14 07:09:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x400300, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:09:21 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0ffff, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:21 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:21 executing program 1: r0 = epoll_create(0x6) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r1, 0xa0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x2000}}, 0x0, 0x1, r1, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) close(r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f0000000080)={0x1, 0x6, 0xa93d}) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(0xffffffffffffffff, 0xa0) sendmsg$NFNL_MSG_CTHELPER_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x30, 0x1, 0x9, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x3}}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_STATUS={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x24044010) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r4, 0xf501, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000001c0)='io.pressure\x00', 0x2, 0x0) 07:09:21 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1543.475875] attempt to access beyond end of device [ 1543.475875] loop5: rw=2049, want=148, limit=14 [ 1543.553207] attempt to access beyond end of device [ 1543.553207] loop5: rw=1, want=21, limit=14 07:09:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xf0ffff, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:09:22 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x1000000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:22 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x1000000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:09:22 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:09:22 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x264, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1543.647066] attempt to access beyond end of device [ 1543.647066] loop5: rw=2049, want=148, limit=14 [ 1543.692250] attempt to access beyond end of device [ 1543.692250] loop5: rw=1, want=21, limit=14 [ 1543.796325] attempt to access beyond end of device [ 1543.796325] loop5: rw=2049, want=148, limit=14 [ 1543.867392] attempt to access beyond end of device [ 1543.867392] loop5: rw=1, want=21, limit=14 [ 1543.891697] attempt to access beyond end of device [ 1543.891697] loop4: rw=1, want=21, limit=14 07:09:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x2000000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:09:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x608, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:09:36 executing program 1: setrlimit(0x7, &(0x7f0000000000)) mlockall(0x7) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 07:09:36 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x2000000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x9006, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:09:36 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:09:36 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000100)={0x3, 0x3}) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:09:36 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x300, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:36 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x3000000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x3000000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:09:36 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xec0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:36 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1558.185096] attempt to access beyond end of device [ 1558.185096] loop5: rw=2049, want=148, limit=14 [ 1558.210992] attempt to access beyond end of device [ 1558.210992] loop4: rw=2049, want=148, limit=14 [ 1558.221113] attempt to access beyond end of device [ 1558.221113] loop4: rw=34817, want=24, limit=14 [ 1558.222209] attempt to access beyond end of device [ 1558.222209] loop4: rw=0, want=21, limit=14 [ 1558.240068] attempt to access beyond end of device [ 1558.240068] loop4: rw=34817, want=148, limit=14 [ 1558.247648] attempt to access beyond end of device [ 1558.247648] loop4: rw=34817, want=24, limit=14 [ 1558.252316] attempt to access beyond end of device [ 1558.252316] loop5: rw=1, want=21, limit=14 [ 1558.384464] attempt to access beyond end of device [ 1558.384464] loop5: rw=2049, want=148, limit=14 [ 1558.415304] attempt to access beyond end of device [ 1558.415304] loop5: rw=1, want=21, limit=14 07:09:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x700, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:09:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x80000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:09:51 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17, 0x20}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r1, 0xa0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00'}) r3 = syz_open_dev$rtc(&(0x7f0000000180), 0x274, 0x10100) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) poll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x2000}, {r2, 0x4024}, {r3, 0xc000}, {r4, 0xf4}, {r0, 0x64c0}], 0x5, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r6, 0x0, r5, 0x0, 0x4000000010000, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x10) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r8, 0x0, r7, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:09:51 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf00, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x4000000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:09:51 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r0, 0x0, r1, &(0x7f0000000040)=0x7fff, 0xa1, 0x0) 07:09:51 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:09:51 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4000000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:51 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1572.858739] attempt to access beyond end of device [ 1572.858739] loop5: rw=2049, want=148, limit=14 [ 1572.884137] attempt to access beyond end of device [ 1572.884137] loop5: rw=1, want=21, limit=14 07:09:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x5000000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:09:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x121000, 0x0) openat(r1, &(0x7f0000000180)='./file0\x00', 0x208880, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x2fd0, 0x3, 0x1, 0x1}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB]) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r2, 0x6804, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 07:09:51 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x6402, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:51 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x8000000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x6000000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:09:51 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x8100, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:09:51 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1572.936514] FAT-fs (loop4): bogus number of reserved sectors [ 1572.936532] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1573.034195] attempt to access beyond end of device [ 1573.034195] loop5: rw=2049, want=148, limit=14 [ 1573.042687] attempt to access beyond end of device [ 1573.042687] loop5: rw=1, want=21, limit=14 [ 1573.240120] FAT-fs (loop4): bogus number of reserved sectors [ 1573.241891] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1573.325890] attempt to access beyond end of device [ 1573.325890] loop5: rw=2049, want=148, limit=14 [ 1573.343503] attempt to access beyond end of device [ 1573.343503] loop5: rw=1, want=21, limit=14 07:10:07 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xc00e, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:07 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xa000000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:07 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x806, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:10:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x200000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:10:07 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:10:07 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r0}, &(0x7f0000000040)) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) timer_create(0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x77359400}}, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f0000000180)={{r3, r4+60000000}, {0x77359400}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000005c0)={0x40182300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:10:07 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'veth0_to_bond\x00', &(0x7f0000000180)=@ethtool_stats={0x1d, 0x1, [0xffffffffffffffff]}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x10002, 0x0) 07:10:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x7000000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:10:07 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf000, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:07 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf000000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x9000000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:10:07 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x34000, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x44000) sendmmsg$inet6(r0, &(0x7f0000001700)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x3e0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9fe64df1}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000080)="55aea0b03d441234d0a124ff6b5a516bcb2a2c8398cbbd756425e21e812232ec3ed047ff93bce51163d278fb58b1e36a15fb633190b125c5dbd6b00a252771d1e19d39c04a0a15fa0f476921608683492c9e375ba0", 0x55}, {&(0x7f0000000100)="36544645d37a9f09b1541dabd616277d26eec6a794759e56835fec348b3d9d83e45e1b834a26d68e98439f49112a8c2e4b1bf7a06f4762fe2c47a965921b4c76f4e6cf40fdc6f91763dc6edd83ee46f631", 0x51}, {&(0x7f0000000180)="b6943966c782777b34a71281eb5f591cea815fb727267b2f", 0x18}, {&(0x7f00000001c0)="9e87f8682454c4805a2c7a8f32f3c1927295a70c0b3c71294b5d114d4caf73859ab0913cfdbc1458d79b6b40765b2329fbdebb", 0x33}], 0x4, &(0x7f0000000240)=[@rthdrdstopts={{0x78, 0x29, 0x37, {0x6c, 0xb, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x3, 0x2, 0x7f, 0x797d, [0x2]}}, @calipso={0x7, 0x8, {0x3, 0x0, 0x41}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x28, {0x3, 0x8, 0x0, 0x3e76, [0x4, 0x2, 0x8, 0xb042]}}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x2, 0x4, 0x1, 0x1f, 0x0, [@mcast2, @mcast2]}}}], 0xc8}}, {{&(0x7f0000000340)={0xa, 0x4e20, 0x81, @private1={0xfc, 0x1, '\x00', 0x1}, 0x5}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000380)="2609c35609093a839af2a2d5e838ed47643d4372eef3a26cb0df2b33e69034386b7df95a973cf4e35e8d64d5b0b4a02244fab0a6a863a4c8605341d1a5f221a9575956b0a73e4e803e7a753ae508da35e4a0a020e7fd334ae6e0134c9c603d2935b0f80afebec4b958021f03fbf70bc85ec4d670375bde132007c12fead9e98b8895afd2ad7a8b82603ca7b9b0586fe36d63", 0x92}, {&(0x7f0000000440)="22ed3c72ee4438acd7dedba662f7efe40ec40b3ab0e898d1bff8405eca7540496f502fed3d50ed1e321c030cafcf1d74fc511dd96b377cff9526180227fcd853", 0x40}, {&(0x7f0000000480)="55d93fe42a7b959878718649917774f5da5813695c6e1eb0b9901c27c308e0918e0470bd225a9495c6ed93590e561f7e79e7ec98d7e11b64b4868f479f36a871df3bdcab261e8c338d37b7e27b9f47bf1787f653b00c7efbe000f298b11a9be018e9ca01599413bca58f2186", 0x6c}], 0x3, &(0x7f0000001840)=ANY=[@ANYBLOB="580000000000000029000000040000003a07000000000000071800000001047f536b0000000000000000e6040000000000000001000103000000071000000102ff020009000000000000000001920119e53434052d995056f46b4f00000100000000000000"], 0x58}}, {{&(0x7f0000000600)={0xa, 0x4e20, 0x80000000, @empty, 0xc7f}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000640)="3b882162cad35d681ad962774fc77f7a048196d41293af7a97838e64d1e5178072263f8d8d86b183006bb9830ba0015bae3d25be", 0x34}, {&(0x7f0000000680)="2e29a4caf2d9cd3f210618227b4da1edacd2b6ad0f31ed549c76a818aa318e4253c96a1dfe9bea44deeab36dca4eaf767365d4e40d3afc8c7f4d71e2b2b11dcbe4d7063b6e4520de08e8e506f0f31bdc787c97a3dbf0862a7a0c159cd1019fe8cab6652458e57ddf770f9fb04649c03f51db288dcc950879f94325944d4fa2fb8333220d1cabc2e95721ea88a67ef99e2152e7b954568cdab68a81539db4ea77063e493b47dd6e65a99fc99a6359e626099c5f94efee99cc26e1ac845714e7ef1b29ab078d016e7b5b33962a8ee242067ae41c8fcabca088e81b1b9c6efe2a10879ecbd26d750e8b39d306a19acf099f77d95b59ff9c2cc32a", 0xf9}], 0x2, &(0x7f00000007c0)=[@tclass={{0x14, 0x29, 0x43, 0x1}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7ff}}, @flowinfo={{0x14, 0x29, 0xb, 0x20}}, @rthdrdstopts={{0x108, 0x29, 0x37, {0x3a, 0x1d, '\x00', [@jumbo={0xc2, 0x4, 0x66}, @enc_lim={0x4, 0x1, 0x3e}, @generic={0x3f, 0x83, "b293e05e480a3a73cb28035ae981cc797f14a30282364da959b8a85fb14644e4e7fe0313c2c7234b5ec125ea1a6eb175f0ee1eec6c68fb20546429052e70be988446814c1bee5e7006130f6d68a355d517c9bbe7dbeb27f7722b112d2430be6038bab155bce16b5b365cc634cd9d85d2ae8a9e9cd0f5d499ce1277a64dc06873e63e3c"}, @jumbo={0xc2, 0x4, 0xffffff80}, @jumbo={0xc2, 0x4, 0x8001}, @generic={0x1b, 0x53, "5705f40865ef4cc03cd4f47440042ceb3fbb30b1f1c7842801077a2a0f85eaf6b1ccfddcca8a1104de3a4fc76f60b0d320b661035c22a18f27faae1c6d26e9dd3ce939c0edeaef4bb90b7b483810e71f0ab3a0"}]}}}], 0x150}}, {{&(0x7f0000000940)={0xa, 0x4e23, 0xd3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}, 0x1c, &(0x7f0000000b80)=[{&(0x7f0000000980)="1f0741f8b243608bad990ab691e19a05cce53897afa38392fce77e76f080ab756d89b2f0dde002e82a63813d728c081b832b9dfd50dac10471c86c0f5a9471c38703a2451d365fcd492373de5e1cdf16baa9fcd6f5e3676b756855ddc34af01495667329f7759be953403d", 0x6b}, {&(0x7f0000000a00)="aa15016951668f22fa6fe0af6ae47846358b1fd80b962151d76f1ae571cfdc5cfb3fd50b3bf816239e288435cda078f65389282a730cf883262c165ec8aaaae4dedc8398aa1cdab4dbbe05ab62229e", 0x4f}, {&(0x7f0000000a80)="3b2606d1ee7344e4ef9009c309b946bffe63f1128f28f42090c9f27dfdc42b05626cf478f0ba3566afde629fca61112e85295b0f1e60b1b84c11a12355513f0e2b657322200cefac8ebc8308caace2a3447a604094de068b2b2782792ef850d8116201c4c836d0084ee6cc5de491128810f9a68623d99b7e7c1fc0dc66970cd16eb7d93af1908b21db98581d8b4b1cf4761be4008e2871d3987227cec8dfe95896cf4dfe582c3111c42e11b48e0a8fd4fb936a87ebbe99e6481566286828011f05ef883ed3f81e1ac444d87012e904ce0f65", 0xd2}], 0x3, &(0x7f0000000bc0)=[@dstopts={{0x170, 0x29, 0x37, {0x0, 0x2a, '\x00', [@generic={0x7f, 0xd3, "024b959aaf47fac5a9b4b3c1e2dcc8c9d9ee81637225fc78486ab08a0d3746ecd088758c1722086f5f499cb97a62dac9e67d8aa57824a580f8b3296e2ae40d36be690459e3f345d503b9336b52b9b5b5c5aea9a7b30a4ede8691c21f4cae841025dbdbc7d1fc97d5214f1cd8b67678015b5bb61cef6c5729800ee6ff671cf0688e8d23f952105fb5183211c5fb524c7ed4b218405fceeb6798311f54555b66aff30b91833176e60bed25a6732463d79e644b41044993fb61b6b63bfcb7139643eeb31e6ca329b9af62e4b53ecf67fda1dcbe2d"}, @generic={0x6, 0x7f, "fc5eae844768eea7c34ac952d8b47044854ba3edd81894fd90e33153330483ac8cd1b1ab778e11ddfa6be90c53fb17966b7a5275bc063b6dc1fef08d0b45b6bd491a350bd43e64c342c2a0c0e04c225d6b1adc73c769e63f6924f7fb9b4fa5ea6875c411842ba1569770164700017c388834aa22fa31d5e6ee3a26846c3b28"}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}, @rthdrdstopts={{0x58, 0x29, 0x37, {0x33, 0x7, '\x00', [@ra={0x5, 0x2, 0x2}, @jumbo={0xc2, 0x4, 0xfffff98c}, @jumbo={0xc2, 0x4, 0x40}, @calipso={0x7, 0x28, {0x1, 0x8, 0x9, 0x6667, [0x6ca0, 0xffff, 0x3, 0x1]}}]}}}, @hopopts_2292={{0x1b0, 0x29, 0x36, {0x2b, 0x32, '\x00', [@enc_lim={0x4, 0x1, 0x4}, @calipso={0x7, 0x18, {0x2, 0x4, 0xc0, 0x4, [0x3, 0x5]}}, @generic={0xfb, 0xef, "1c57b1003bf6183f932f3372e40d14c4a08a9347c290f60534a721036c23e20aa5b970c041b23c25dede69a4b6d8293c4ede7e207823a7b6b1399fffe4756c93b8d432e4702d3ac751cee8384c32ef10a51b15d48ab9dd84bcf792d84b0b5728c828084e41635ba21b46bf880104adfd670d845374f9ced01cc394dce8ccc565f58080b34d8e26fbcdf6fd7c6b819e81214915f0db4fc43ba7288b275d55382e6dd7fd9c6ded2292105459c16170f8aa3364fac19cad05a5b8514b69d0e4c26bca336fc499ad362efeb06b82610801e031a511dd1589e736702909b55de11401f2dc1fde3ce503f734759fa23d7429"}, @generic={0x9, 0x83, "5f48df3f442cc96bdf7bddb62a5962d24d6036036d7331564ed270e41101f26b8c1203e58a256ce3b00822c46717e6516be49b2c95f05559f1b1a79567b4d6a0fc7c42b5e6ba22bc37af95345c74daba4cf528531d5119954c6837179aaefca2c4f3aba76544759512db5595d1e96762cb24e6399b95d4aa017d984cd38d07497a34db"}]}}}, @rthdr={{0x48, 0x29, 0x39, {0x2f, 0x6, 0x2, 0x3a, 0x0, [@dev={0xfe, 0x80, '\x00', 0x38}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, '\x00', 0x31}]}}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x88, 0x1, '\x00', [@padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0x2}]}}}], 0x410}}, {{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001000)="b9f95b0887ca96597a3b992a8668", 0xe}, {&(0x7f0000001040)="09e52912721629e4f2a10040fb0a6cccb0a74cce5759292f8552719b2f854c6ccd9fbf736747e8a904fb7a665173b7259982f397af6c816d628283c49e1d3b352ae212a9b38ee84a8e1e8a8b527ce2f0eb1dc2744adb7f66bde6215b5e016472b48e798fbc66af92c63e4681c96a7cfc81e87bb0c74bcb334647843915ab2529fca3", 0x82}, {&(0x7f0000001100)}, {&(0x7f0000001140)="0a538fe4427419dff3ef3012d1d262c23fa232634035edfe68720db3ee90d1f86590b47909151fa5231825c7ee9c09ed28535d7e9f7a63713edaff10b2e527e3d89295412184e0ae8d095587fc5cb3e8aabae643e76ea6ead408445990336aa10c7d9d2e7a1847a23c8a8c177a40c8a1bed85ac148be2017083bbe6429e5dd18023d9dd883cf02cad67edff7e28edabdc0db6ec6a5f08aec7ffd3673ca254f26acf0d40f1d51cf615da9ee84af0f6f73d16250b294be4ab4c206701629c0c1da2ec4f37c6ed18236f6c68f174e6cdf34b35e034df71db051b485cbf9a3498cea", 0xe0}, {&(0x7f0000001240)="223b8fa67650c91761c62c8fb848231f5b83bc479bdbbdce7fa7fbc06ad683bbaed9d2d613b06377edf8fb6603204e80595022f0f7951e4893e41e3399c5ad1664ba8f085de27973ff1e7aa2d5ddf0b6205cb91d416a8a2f0b195a81a419bd43b3d7902c0b07a68fd6b0af616a98be4cb8fe593475e3e97e2f424851db3bc80bffd833d6de016fb740fb5526164871c213c38cf39d370d73f4794564aedb5a6e2f6b493bb964dbc8c5ada41ab8d51b23d3dab43c93fcb6c48a712a39af2e972f24985de122039ec5180f82f98191eb5a463aaab8cf35979f7254bef5fdc23b8146aba378440fca8d3aad833afc7359", 0xef}, {&(0x7f0000001340)="b4548b1b20d9012e7750d2d6b49eff5863e960f900532253cc78113c5aba1ea888fc74150f3d7fa8aed694b3c38971cf3ae1e11dce547eeb286823ed5a4859cc140700f5c30d2a7be145f422abdad2d63312db145893936e6385f07fe60874651f01bceb5b083065cd0d681424727f8a", 0x70}, {&(0x7f00000013c0)="2ae63af756e48dc7eb9ef7595efcba28aeee1a2bf4d4906cbd28a38f2c1738286413fb4f02a50a907e6e2b4c35c6313f500f22a5d0cd4d8ca6fcebcc29e23216b55dd4629183328c0139d90eaacfbb7a9463eb7babd588f24a6a5c4458ba62c99c513dc0e62412e46a15da17933f48b62b48f8554b7a2305fe2f19d55f814cf45ac2af19b21d60b4d61dfcc905cbba807fce2fb7208a9b3c3a1132ce2b727f", 0x9f}, {&(0x7f0000001480)="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", 0xfb}], 0x8, &(0x7f0000001600)=[@dstopts_2292={{0x68, 0x29, 0x4, {0x88, 0x9, '\x00', [@calipso={0x7, 0x48, {0x1, 0x10, 0x3, 0x1, [0xffffffff, 0x8000, 0x75f, 0x4, 0x1, 0xe5dc, 0xfac9, 0x81]}}]}}}, @rthdr={{0x68, 0x29, 0x39, {0x33, 0xa, 0x2, 0x5, 0x0, [@mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @local, @ipv4={'\x00', '\xff\xff', @private=0xa010102}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x400}}], 0xe8}}], 0x5, 0x4000080) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) 07:10:07 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x80000, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:07 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:10:07 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(0x0, 0x3) 07:10:07 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x17020000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:07 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x400300, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1589.155815] attempt to access beyond end of device [ 1589.155815] loop5: rw=2049, want=148, limit=14 [ 1589.171004] attempt to access beyond end of device [ 1589.171004] loop4: rw=2049, want=148, limit=14 [ 1589.186073] attempt to access beyond end of device [ 1589.186073] loop4: rw=34817, want=24, limit=14 [ 1589.189834] attempt to access beyond end of device [ 1589.189834] loop4: rw=0, want=21, limit=14 [ 1589.215733] attempt to access beyond end of device [ 1589.215733] loop4: rw=0, want=21, limit=14 [ 1589.310811] attempt to access beyond end of device [ 1589.310811] loop5: rw=1, want=21, limit=14 07:10:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0xe0ffff, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:10:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x2000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:10:20 executing program 1: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf000000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:20 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x1f000000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xf000000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:10:20 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0ffff, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(0x0, 0x3) 07:10:20 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0xffff) [ 1602.396627] attempt to access beyond end of device [ 1602.396627] loop5: rw=2049, want=148, limit=14 [ 1602.407433] attempt to access beyond end of device [ 1602.407433] loop4: rw=2049, want=148, limit=14 [ 1602.409231] attempt to access beyond end of device [ 1602.409231] loop5: rw=34817, want=24, limit=14 07:10:20 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, 0xffffffffffffffff, 0x0, 0xa2, 0x0) bind$packet(r1, &(0x7f00000002c0)={0x11, 0x18, 0x0, 0x1, 0x48, 0x6, @broadcast}, 0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) openat(r0, &(0x7f0000000100)='./file1\x00', 0x113000, 0x41) truncate(&(0x7f0000003200)='./file1\x00', 0x3) setxattr$trusted_overlay_opaque(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), &(0x7f0000000280), 0x2, 0x0) [ 1602.412316] attempt to access beyond end of device [ 1602.412316] loop4: rw=34817, want=24, limit=14 [ 1602.413985] attempt to access beyond end of device [ 1602.413985] loop4: rw=0, want=21, limit=14 [ 1602.429751] attempt to access beyond end of device [ 1602.429751] loop4: rw=34817, want=148, limit=14 [ 1602.431822] attempt to access beyond end of device [ 1602.431822] loop4: rw=34817, want=24, limit=14 [ 1602.432050] attempt to access beyond end of device [ 1602.432050] loop4: rw=0, want=21, limit=14 07:10:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x6a9e8c87, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:10:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x1000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:10:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x80000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:10:20 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x1000000, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(0x0, 0x3) 07:10:20 executing program 1: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0ffff, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:20 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x81000000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:20 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x2000000, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x80040000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:10:21 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17, 0x3}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:10:21 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x0) 07:10:21 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x9effffff, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="48010000100001000000000000000000ac1e00000000000000000000000000fe81609a2aeba32e8a000000000000aa0000ff0300000000000000006c00000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="fe8800000000000000000000000000010000000032000000fc00000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000a0004000000000000000000580002006362632861657329000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000fc24aa6b13c2e62f3456b1cbceeac6a0"], 0x148}}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x12d002, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x6d4202, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) pread64(r2, &(0x7f0000001780)=""/200, 0xc8, 0x80) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001240)=ANY=[@ANYBLOB="31ffffff100001000000800000000000ac1e00018000008000000000000004e90000000000aa00000000000000050000000000000000a0d100935e2d3cf6011e4cb5dcc7a23ef141c891a93bed5dd98e1f7a729987dd17e306dcf94f148f6ef8aeafc8fcd00335cae714059ef741128f370c6a723be8fe2ddefa3e3df8c9bd1b523bd6550c1d6d7c20ce3e2ec7cc6ed158c5be78da85593f24e16f3f0d20b1feaf81644164c3007016f793ede127185c2219fae5b0fcd29e574d847922eb4d437212ff5adb9e5d2dbace0c96066347e975db6f3bc627af323b76f5e6d129caa1c17d2b1d6c0873b97c6f9944996f4dac2d4c4c21", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="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"], 0x148}}, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r4, &(0x7f0000000480)={0xa, 0x4e24, 0x2, @mcast2, 0x2}, 0x1c) ioctl$BTRFS_IOC_DEFRAG_RANGE(r4, 0x40309410, &(0x7f0000000080)={0x5, 0x1, 0x0, 0x6, 0x1, [0x386, 0xffffffff, 0x10000, 0x401]}) ftruncate(r1, 0x1e) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r5, 0xa0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r5, &(0x7f0000001200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000001140)={0xa8, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}]}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_ADDR={0x20, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40008c1}, 0x8080) [ 1602.621801] attempt to access beyond end of device [ 1602.621801] loop4: rw=2049, want=24, limit=14 [ 1602.656843] attempt to access beyond end of device [ 1602.656843] loop5: rw=2049, want=148, limit=14 07:10:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x878c9e6a, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1602.769916] FAT-fs (loop4): invalid media value (0x00) [ 1602.769928] FAT-fs (loop4): Can't find a valid FAT filesystem 07:10:21 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x3000000, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:21 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x0) 07:10:21 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xc00e0000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1603.015905] FAT-fs (loop4): invalid media value (0x00) [ 1603.015916] FAT-fs (loop4): Can't find a valid FAT filesystem 07:10:35 executing program 1: syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = socket(0x0, 0x4, 0x0) write$vga_arbiter(r0, &(0x7f0000000480)=@unlock_all, 0xb) mount$9p_fd(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0x0, &(0x7f0000002040)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@posixacl}]}}) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='hybla\x00', 0x6) sendmsg$NL80211_CMD_RELOAD_REGDB(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc0c5}, 0x20008801) syz_mount_image$vfat(&(0x7f0000002100), &(0x7f0000002140)='./file0\x00', 0x422, 0x2, &(0x7f0000002340)=[{&(0x7f0000002180)="51a994ada974065ec36248de19a1248849da912e2e55affad8ae8946cbbd89f2a6ddadfa48bbbc40af349b7bb1bb02bf7a65472cc249da3e28ad25aaa25acc01b44a8b8e8fae397b0c16104098aa6959f73bc79e38f3a0701786bda833f8ba720518d22b11e0a2c8abfcef8de6b5d71ebfb1cff7526f070f8d1f7e9de69279d7c17b2cabdd02ee3d8acae3b18f46221a5bfbad2c366350d31ecc894d02b5e3e8d88cf9408c6c142de0124f537ddb00c912b76b49e9f06c82c8e7367897f588", 0xbf, 0x7}, {&(0x7f0000002280)="5317812c8e533baa224ff72744985627dfc473c2809c32b4b46e7acebeb81f864d15867ba211ac3d98f63773d8e57f48c1334a1c38a4fac1461cbfb83865dcfcef68b14360", 0x45, 0x7ff}], 0xc484, &(0x7f0000000080)=ANY=[@ANYBLOB='dos1xfloppy,shortname=win95,nnonumtail=1,uid=', @ANYRESHEX=0xee01, @ANYBLOB="2c6e6f6e756d7461642c17696c3d302c756e695f786c6174653d312c756e695f786c6174653d302c00"]) openat$dir(0xffffffffffffff9c, &(0x7f0000002400)='./file0\x00', 0x101002, 0x180) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) mknod$loop(&(0x7f0000002440)='./file0\x00', 0x800, 0x1) 07:10:35 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0x100}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x100, 0x10d) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x84e40, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) r5 = openat$cgroup_ro(r3, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) lseek(r5, 0x2, 0x4) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:10:35 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x0) 07:10:35 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x200000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:10:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x8cffffff, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:10:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x2000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:10:35 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf000000, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x9effffff, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:10:35 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x64020000, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:35 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xff000000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1617.404163] FAT-fs (loop4): Directory bread(block 5) failed [ 1617.404179] FAT-fs (loop4): Directory bread(block 6) failed [ 1617.404191] FAT-fs (loop4): Directory bread(block 7) failed [ 1617.404336] FAT-fs (loop4): Directory bread(block 8) failed [ 1617.404351] FAT-fs (loop4): Directory bread(block 9) failed [ 1617.404363] FAT-fs (loop4): Directory bread(block 10) failed [ 1617.404376] FAT-fs (loop4): Directory bread(block 11) failed [ 1617.414639] FAT-fs (loop4): Directory bread(block 5) failed [ 1617.414766] FAT-fs (loop4): Directory bread(block 6) failed [ 1617.414794] FAT-fs (loop4): Directory bread(block 7) failed [ 1617.472754] handle_bad_sector: 6 callbacks suppressed [ 1617.472772] attempt to access beyond end of device [ 1617.472772] loop5: rw=2049, want=148, limit=14 [ 1617.489091] attempt to access beyond end of device [ 1617.489091] loop5: rw=34817, want=24, limit=14 [ 1617.556919] 9pnet: Insufficient options for proto=fd 07:10:48 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x3000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:10:48 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3100, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() mount$bind(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x20, 0x0) r1 = fork() connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1, 0x1, 0x5, 0x4000009, r3}) wait4(r3, &(0x7f0000000140), 0x8, &(0x7f00000003c0)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000200)=0x80, 0x80000) copy_file_range(r4, &(0x7f0000000240)=0x5, r0, &(0x7f0000000480)=0x8, 0x4, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs_stats\x00') ptrace(0x10, r1) 07:10:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0xe0ffff, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:10:48 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xeaffffff, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:10:48 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xfffff000, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:48 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020801009428a20470000480f801", 0x1a}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @c}}) 07:10:48 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x81000000, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 1) 07:10:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 2) 07:10:48 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xf0ffffff, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:10:48 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x9effffff, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:48 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xffffff7f, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:48 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xc00e0000, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:48 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xfffff000, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:10:48 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:10:48 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xffffff9e, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1629.898026] FAT-fs (loop4): invalid media value (0x00) [ 1629.898041] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1629.927472] attempt to access beyond end of device [ 1629.927472] loop5: rw=2049, want=148, limit=14 [ 1629.930364] attempt to access beyond end of device [ 1629.930364] loop5: rw=34817, want=24, limit=14 [ 1629.936048] FAULT_INJECTION: forcing a failure. [ 1629.936048] name failslab, interval 1, probability 0, space 0, times 0 [ 1629.936071] CPU: 0 PID: 10349 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1629.936081] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1629.936088] Call Trace: [ 1629.936119] dump_stack+0x107/0x167 [ 1629.936143] should_fail.cold+0x5/0xa [ 1629.936167] ? getname_flags.part.0+0x50/0x4f0 [ 1629.936189] should_failslab+0x5/0x20 [ 1629.936207] kmem_cache_alloc+0x5b/0x360 [ 1629.936237] getname_flags.part.0+0x50/0x4f0 [ 1629.936262] user_path_at_empty+0xa1/0x100 [ 1629.936286] do_sys_truncate.part.0+0x86/0x140 [ 1629.936304] ? vfs_truncate+0x5e0/0x5e0 [ 1629.936322] ? ksys_write+0x1a9/0x260 [ 1629.936354] __x64_sys_truncate+0x69/0xa0 [ 1629.936375] do_syscall_64+0x33/0x40 [ 1629.936395] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1629.936409] RIP: 0033:0x7f8a1dfb0b19 [ 1629.936428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1629.936439] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1629.936461] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1629.936472] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1629.936483] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1629.936494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1629.936506] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1630.233689] FAULT_INJECTION: forcing a failure. [ 1630.233689] name failslab, interval 1, probability 0, space 0, times 0 [ 1630.233704] CPU: 0 PID: 10389 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1630.233710] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1630.233714] Call Trace: [ 1630.233732] dump_stack+0x107/0x167 [ 1630.233746] should_fail.cold+0x5/0xa [ 1630.233759] ? create_object.isra.0+0x3a/0xa20 [ 1630.233773] should_failslab+0x5/0x20 [ 1630.233788] kmem_cache_alloc+0x5b/0x360 [ 1630.233802] create_object.isra.0+0x3a/0xa20 [ 1630.233813] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1630.233827] kmem_cache_alloc+0x159/0x360 [ 1630.233845] getname_flags.part.0+0x50/0x4f0 [ 1630.233859] user_path_at_empty+0xa1/0x100 [ 1630.233873] do_sys_truncate.part.0+0x86/0x140 [ 1630.233882] ? vfs_truncate+0x5e0/0x5e0 [ 1630.233892] ? ksys_write+0x1a9/0x260 [ 1630.233911] __x64_sys_truncate+0x69/0xa0 [ 1630.233923] do_syscall_64+0x33/0x40 [ 1630.233935] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1630.233943] RIP: 0033:0x7f8a1dfb0b19 [ 1630.233955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1630.233961] RSP: 002b:00007f8a1b505188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1630.233973] RAX: ffffffffffffffda RBX: 00007f8a1e0c4020 RCX: 00007f8a1dfb0b19 [ 1630.233980] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1630.233987] RBP: 00007f8a1b5051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1630.233993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1630.233999] R13: 00007ffd405a6aaf R14: 00007f8a1b505300 R15: 0000000000022000 [ 1630.243929] FAT-fs (loop4): invalid media value (0x00) [ 1630.243945] FAT-fs (loop4): Can't find a valid FAT filesystem 07:11:01 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xfffff000, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:01 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@xfs_parent={0x19, 0x82, {0x4000f37b, 0x80000001, 0x7, 0x4}}, &(0x7f00000001c0), 0x400) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:11:01 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 3) 07:11:01 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3100, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() mount$bind(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x20, 0x0) r1 = fork() connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1, 0x1, 0x5, 0x4000009, r3}) wait4(r3, &(0x7f0000000140), 0x8, &(0x7f00000003c0)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000200)=0x80, 0x80000) copy_file_range(r4, &(0x7f0000000240)=0x5, r0, &(0x7f0000000480)=0x8, 0x4, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs_stats\x00') ptrace(0x10, r1) 07:11:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x4000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:11:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xffffff7f, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:11:01 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xfffffff0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x1000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) [ 1643.443560] attempt to access beyond end of device [ 1643.443560] loop5: rw=2049, want=148, limit=14 [ 1643.444480] attempt to access beyond end of device [ 1643.444480] loop5: rw=34817, want=24, limit=14 [ 1643.451238] FAULT_INJECTION: forcing a failure. [ 1643.451238] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1643.451250] CPU: 1 PID: 10408 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1643.451256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1643.451259] Call Trace: [ 1643.451277] dump_stack+0x107/0x167 [ 1643.451290] should_fail.cold+0x5/0xa [ 1643.451309] strncpy_from_user+0x34/0x470 [ 1643.451329] getname_flags.part.0+0x95/0x4f0 [ 1643.451343] user_path_at_empty+0xa1/0x100 [ 1643.451356] do_sys_truncate.part.0+0x86/0x140 [ 1643.451366] ? vfs_truncate+0x5e0/0x5e0 [ 1643.451375] ? ksys_write+0x1a9/0x260 [ 1643.451397] __x64_sys_truncate+0x69/0xa0 [ 1643.451409] do_syscall_64+0x33/0x40 [ 1643.451420] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1643.451427] RIP: 0033:0x7f8a1dfb0b19 [ 1643.451438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1643.451444] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1643.451457] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1643.451463] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1643.451469] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1643.451476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1643.451482] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1643.453747] attempt to access beyond end of device [ 1643.453747] loop4: rw=2049, want=148, limit=14 [ 1643.472283] attempt to access beyond end of device [ 1643.472283] loop4: rw=34817, want=24, limit=14 [ 1643.473124] attempt to access beyond end of device [ 1643.473124] loop4: rw=0, want=21, limit=14 [ 1643.478994] attempt to access beyond end of device [ 1643.478994] loop4: rw=34817, want=148, limit=14 [ 1643.483866] attempt to access beyond end of device [ 1643.483866] loop4: rw=34817, want=24, limit=14 [ 1643.484320] attempt to access beyond end of device [ 1643.484320] loop4: rw=0, want=21, limit=14 07:11:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x5000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:11:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xffffff8c, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:11:15 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x2000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:11:15 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xffffff7f, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:15 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x8, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x400, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r2, 0xa0) ppoll(&(0x7f0000000100)=[{r2, 0x1000}], 0x1, &(0x7f0000000180), &(0x7f00000001c0)={[0x2]}, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x7) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:11:15 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 4) 07:11:15 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xffffffff, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:15 executing program 1: ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r2 = socket$inet(0x2, 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000200)=[r2], 0x1) read(r1, &(0x7f0000000140)=""/89, 0x59) syz_io_uring_setup(0x1, &(0x7f0000000180), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x8000, 0x40) syz_io_uring_submit(r3, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x4004, @fd=r5, 0x7, 0x6, 0x20, 0x6, 0x1, {0x2}}, 0x9) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000080)='\x00', 0x400, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 07:11:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xffffff9e, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:11:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xffffffea, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1657.282162] attempt to access beyond end of device [ 1657.282162] loop4: rw=2049, want=24, limit=14 07:11:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xfffffff0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:11:15 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0xf, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:15 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xffffff9e, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0xffffffff, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:11:15 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 5) 07:11:15 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x202000, 0x0) ftruncate(0xffffffffffffffff, 0x0) statfs(0x0, &(0x7f0000001600)=""/249) unlink(&(0x7f0000001340)='./file0\x00') r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5e, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001900)=[{0x0, 0x0, 0xff}, {0x0}]) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000000)=0x1) [ 1657.324841] attempt to access beyond end of device [ 1657.324841] loop5: rw=2049, want=148, limit=14 [ 1657.336798] attempt to access beyond end of device [ 1657.336798] loop5: rw=34817, want=24, limit=14 [ 1657.339092] FAULT_INJECTION: forcing a failure. [ 1657.339092] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1657.339149] CPU: 0 PID: 10456 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1657.339160] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1657.339167] Call Trace: [ 1657.339195] dump_stack+0x107/0x167 [ 1657.339223] should_fail.cold+0x5/0xa [ 1657.339255] __alloc_pages_nodemask+0x182/0x680 [ 1657.339288] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1657.339308] ? xas_load+0x66/0x2c0 [ 1657.339337] ? find_get_entry+0x2d9/0x6e0 [ 1657.339374] alloc_pages_current+0x187/0x280 [ 1657.339404] __page_cache_alloc+0x2d2/0x360 [ 1657.339434] pagecache_get_page+0x2c7/0xc80 [ 1657.339467] block_truncate_page+0x199/0xab0 [ 1657.339492] ? fat_add_cluster+0x100/0x100 [ 1657.339515] ? selinux_inode_setattr+0x217/0x2e0 [ 1657.339540] ? block_write_full_page+0x290/0x290 [ 1657.339564] ? inode_newsize_ok+0x18d/0x210 [ 1657.339585] ? setattr_prepare+0x135/0x7e0 [ 1657.339614] fat_setattr+0xa19/0xf40 [ 1657.339642] ? fat_free.isra.0+0x940/0x940 [ 1657.339661] notify_change+0xba2/0x1080 [ 1657.339696] do_truncate+0x134/0x1f0 [ 1657.339716] ? file_open_root+0x440/0x440 [ 1657.339734] ? __check_object_size+0x319/0x440 [ 1657.339771] ? security_inode_permission+0xcb/0x100 [ 1657.339804] vfs_truncate+0x45b/0x5e0 [ 1657.339834] do_sys_truncate.part.0+0x122/0x140 [ 1657.339853] ? vfs_truncate+0x5e0/0x5e0 [ 1657.339871] ? ksys_write+0x1a9/0x260 [ 1657.339909] __x64_sys_truncate+0x69/0xa0 [ 1657.339932] do_syscall_64+0x33/0x40 [ 1657.339954] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1657.339968] RIP: 0033:0x7f8a1dfb0b19 [ 1657.339989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1657.340001] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1657.340025] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1657.340037] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1657.340049] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1657.340061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1657.340074] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1657.536194] attempt to access beyond end of device [ 1657.536194] loop5: rw=2049, want=148, limit=14 [ 1657.538185] attempt to access beyond end of device [ 1657.538185] loop5: rw=34817, want=24, limit=14 [ 1657.545207] FAULT_INJECTION: forcing a failure. [ 1657.545207] name failslab, interval 1, probability 0, space 0, times 0 [ 1657.545229] CPU: 0 PID: 10496 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1657.545242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1657.545249] Call Trace: [ 1657.545281] dump_stack+0x107/0x167 [ 1657.545317] should_fail.cold+0x5/0xa [ 1657.545341] ? create_object.isra.0+0x3a/0xa20 [ 1657.545365] should_failslab+0x5/0x20 [ 1657.545393] kmem_cache_alloc+0x5b/0x360 [ 1657.545423] create_object.isra.0+0x3a/0xa20 [ 1657.545444] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1657.545473] kmem_cache_alloc+0x159/0x360 [ 1657.545509] alloc_buffer_head+0x20/0x110 [ 1657.545532] alloc_page_buffers+0x14d/0x6d0 [ 1657.545564] create_empty_buffers+0x2c/0x640 [ 1657.545595] block_truncate_page+0x76c/0xab0 [ 1657.545621] ? fat_add_cluster+0x100/0x100 [ 1657.545645] ? selinux_inode_setattr+0x217/0x2e0 [ 1657.545665] ? block_write_full_page+0x290/0x290 [ 1657.545687] ? inode_newsize_ok+0x18d/0x210 [ 1657.545707] ? setattr_prepare+0x135/0x7e0 [ 1657.545736] fat_setattr+0xa19/0xf40 [ 1657.545775] ? fat_free.isra.0+0x940/0x940 [ 1657.545794] notify_change+0xba2/0x1080 [ 1657.545828] do_truncate+0x134/0x1f0 [ 1657.545848] ? file_open_root+0x440/0x440 [ 1657.545867] ? __check_object_size+0x319/0x440 [ 1657.545904] ? security_inode_permission+0xcb/0x100 [ 1657.545937] vfs_truncate+0x45b/0x5e0 [ 1657.545967] do_sys_truncate.part.0+0x122/0x140 [ 1657.545986] ? vfs_truncate+0x5e0/0x5e0 [ 1657.546005] ? ksys_write+0x1a9/0x260 [ 1657.546043] __x64_sys_truncate+0x69/0xa0 [ 1657.546065] do_syscall_64+0x33/0x40 [ 1657.546088] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1657.546103] RIP: 0033:0x7f8a1dfb0b19 [ 1657.546124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1657.546136] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1657.546159] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1657.546174] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1657.546190] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1657.546203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1657.546216] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1657.547105] attempt to access beyond end of device [ 1657.547105] loop5: rw=0, want=21, limit=14 [ 1657.675488] attempt to access beyond end of device [ 1657.675488] loop4: rw=2049, want=21, limit=14 [ 1657.697217] attempt to access beyond end of device [ 1657.697217] loop4: rw=1, want=21, limit=14 07:11:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x3000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:11:28 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x6000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:11:28 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup2(r1, 0xffffffffffffffff) r3 = syz_mount_image$msdos(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x4, 0x1, &(0x7f0000000300)=[{&(0x7f0000000380)="ac402b1d6f2335bec9981c963977c8415c36302fbadfb02d07f452a063f6d5d4434c3b8ec1f8828bf48f997eaf08aeaf8ee2d8c90079666d54f4baca229be4591a65afbebb662d442b70352c0cb171ca670ccb077111bb24b69e470bd434a8f3769af36daa02db218a595dc9a6058200a50ab3da1e07aee051418ade9b58e69647e57c9db4e5aea905ea16f18d6c3614649bfa642e4cf31422d50d8f288e018a4e58bd996698ec479aa8b8d82ee98eac25a9abf31bb3dc4d880476f912b0c20b680522bd9dbe88e017ce1678e31349ad52c7456a2ba27cdb0935f2956a874e6a269c483d6017214298debc3875f7b7b4f6c102ff80112995", 0xf8, 0x8}], 0x4, &(0x7f0000000480)={[{@fat=@uid}, {@dots}, {@dots}, {@dots}, {@fat=@dos1xfloppy}, {@dots}, {@fat=@dos1xfloppy}], [{@euid_gt={'euid>', 0xee00}}, {@subj_user}, {@audit}, {@euid_lt={'euid<', 0xee01}}, {@permit_directio}, {@subj_type={'subj_type', 0x3d, 'security.evm\x00'}}]}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000540)={r3, 0x100000001, 0x20, 0x1}) write(r1, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r4 = dup(r0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), 0x1, 0x2) r5 = openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x20000, 0x0, 0x10}, 0x18) r6 = getpgrp(0xffffffffffffffff) sendmsg$nl_generic(r5, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x1e, 0x1, 0x70bd2b, 0x25dfdbfb, {0x8}, [@typed={0x8, 0x3b, 0x0, 0x0, @pid=r6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4044) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000000c0)) unshare(0x48020200) 07:11:28 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x10, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:28 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xfffffff0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:28 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 6) 07:11:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:11:28 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:11:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x2, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:11:28 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xffffffff, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:28 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 7) [ 1670.184020] attempt to access beyond end of device [ 1670.184020] loop4: rw=2049, want=148, limit=14 [ 1670.195236] FAT-fs (loop1): Unrecognized mount option "euid>00000000000000060928" or missing value [ 1670.199664] attempt to access beyond end of device [ 1670.199664] loop4: rw=34817, want=24, limit=14 07:11:28 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1a, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1670.200167] attempt to access beyond end of device [ 1670.200167] loop4: rw=0, want=21, limit=14 [ 1670.220769] attempt to access beyond end of device [ 1670.220769] loop5: rw=2049, want=148, limit=14 07:11:28 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file1/file0\x00', 0x8040, 0x20) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x9}}, './file1\x00'}) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1670.221714] attempt to access beyond end of device [ 1670.221714] loop4: rw=34817, want=148, limit=14 [ 1670.223212] attempt to access beyond end of device [ 1670.223212] loop5: rw=34817, want=24, limit=14 07:11:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x3, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1670.227616] FAULT_INJECTION: forcing a failure. [ 1670.227616] name failslab, interval 1, probability 0, space 0, times 0 [ 1670.227633] CPU: 1 PID: 10527 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1670.227641] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1670.227647] Call Trace: [ 1670.227668] dump_stack+0x107/0x167 [ 1670.227688] should_fail.cold+0x5/0xa [ 1670.227706] ? create_object.isra.0+0x3a/0xa20 [ 1670.227724] should_failslab+0x5/0x20 [ 1670.227739] kmem_cache_alloc+0x5b/0x360 [ 1670.227768] create_object.isra.0+0x3a/0xa20 [ 1670.227786] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1670.227807] kmem_cache_alloc+0x159/0x360 [ 1670.227833] alloc_buffer_head+0x20/0x110 [ 1670.227850] alloc_page_buffers+0x14d/0x6d0 [ 1670.227874] create_empty_buffers+0x2c/0x640 [ 1670.227897] block_truncate_page+0x76c/0xab0 [ 1670.227916] ? fat_add_cluster+0x100/0x100 [ 1670.227933] ? selinux_inode_setattr+0x217/0x2e0 [ 1670.227948] ? block_write_full_page+0x290/0x290 [ 1670.227964] ? inode_newsize_ok+0x18d/0x210 [ 1670.227979] ? setattr_prepare+0x135/0x7e0 [ 1670.228001] fat_setattr+0xa19/0xf40 [ 1670.228022] ? fat_free.isra.0+0x940/0x940 [ 1670.228036] notify_change+0xba2/0x1080 [ 1670.228061] do_truncate+0x134/0x1f0 [ 1670.228075] ? file_open_root+0x440/0x440 [ 1670.228089] ? __check_object_size+0x319/0x440 07:11:28 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0xf, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1670.228117] ? security_inode_permission+0xcb/0x100 [ 1670.228140] vfs_truncate+0x45b/0x5e0 [ 1670.228162] do_sys_truncate.part.0+0x122/0x140 07:11:28 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0xc0, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1670.228177] ? vfs_truncate+0x5e0/0x5e0 [ 1670.228190] ? ksys_write+0x1a9/0x260 [ 1670.228218] __x64_sys_truncate+0x69/0xa0 [ 1670.228235] do_syscall_64+0x33/0x40 [ 1670.228252] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1670.228263] RIP: 0033:0x7f8a1dfb0b19 [ 1670.228279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1670.228287] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1670.228305] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1670.228314] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1670.228323] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1670.228332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1670.228341] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1670.233035] attempt to access beyond end of device [ 1670.233035] loop5: rw=0, want=21, limit=14 [ 1670.512839] attempt to access beyond end of device [ 1670.512839] loop5: rw=2049, want=148, limit=14 [ 1670.524634] attempt to access beyond end of device [ 1670.524634] loop5: rw=34817, want=24, limit=14 [ 1670.530715] FAULT_INJECTION: forcing a failure. [ 1670.530715] name failslab, interval 1, probability 0, space 0, times 0 [ 1670.530732] CPU: 1 PID: 10551 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1670.530740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1670.530746] Call Trace: [ 1670.530768] dump_stack+0x107/0x167 [ 1670.530787] should_fail.cold+0x5/0xa [ 1670.530805] ? create_object.isra.0+0x3a/0xa20 [ 1670.530823] should_failslab+0x5/0x20 [ 1670.530838] kmem_cache_alloc+0x5b/0x360 [ 1670.530859] create_object.isra.0+0x3a/0xa20 [ 1670.530880] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1670.530900] kmem_cache_alloc+0x159/0x360 [ 1670.530925] alloc_buffer_head+0x20/0x110 [ 1670.530942] alloc_page_buffers+0x14d/0x6d0 [ 1670.530965] create_empty_buffers+0x2c/0x640 [ 1670.530987] block_truncate_page+0x76c/0xab0 [ 1670.531006] ? fat_add_cluster+0x100/0x100 [ 1670.531023] ? selinux_inode_setattr+0x217/0x2e0 [ 1670.531037] ? block_write_full_page+0x290/0x290 [ 1670.531053] ? inode_newsize_ok+0x18d/0x210 [ 1670.531068] ? setattr_prepare+0x135/0x7e0 [ 1670.531088] fat_setattr+0xa19/0xf40 [ 1670.531109] ? fat_free.isra.0+0x940/0x940 [ 1670.531122] notify_change+0xba2/0x1080 [ 1670.531147] do_truncate+0x134/0x1f0 [ 1670.531161] ? file_open_root+0x440/0x440 [ 1670.531174] ? __check_object_size+0x319/0x440 [ 1670.531201] ? security_inode_permission+0xcb/0x100 [ 1670.531224] vfs_truncate+0x45b/0x5e0 [ 1670.531245] do_sys_truncate.part.0+0x122/0x140 [ 1670.531259] ? vfs_truncate+0x5e0/0x5e0 [ 1670.531273] ? ksys_write+0x1a9/0x260 [ 1670.531299] __x64_sys_truncate+0x69/0xa0 [ 1670.531316] do_syscall_64+0x33/0x40 [ 1670.531335] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1670.531346] RIP: 0033:0x7f8a1dfb0b19 [ 1670.531363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1670.531371] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1670.531388] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1670.531397] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1670.531406] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1670.531415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1670.531423] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1670.540020] attempt to access beyond end of device [ 1670.540020] loop5: rw=0, want=21, limit=14 [ 1670.940952] FAT-fs (loop1): Unrecognized mount option "euid>00000000000000060928" or missing value 07:11:45 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x40040, 0x0) kcmp(r4, r4, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) fcntl$setown(r1, 0x8, r4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) kcmp(r3, r5, 0x1, r6, 0xffffffffffffffff) 07:11:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x4, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:11:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x4000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:11:45 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0xec0, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:45 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 8) 07:11:45 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r0, 0x0, 0x5, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file1\x00') truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:11:45 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x10, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:45 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x7000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:11:45 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x33fe0, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x5, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:11:45 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 9) 07:11:45 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x11, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:11:45 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000010000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = accept$unix(r0, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000280)={0x0, 0xfff, 0x1, [0x800, 0x20, 0x2, 0x0, 0xfffffffffffffff8], [0x2, 0x5, 0x1, 0x8001, 0x6, 0xff, 0x3, 0x5, 0x5, 0x4, 0x7, 0x800, 0x8, 0xffffffffffff0001, 0x20, 0xffffffff, 0xfffffffffffff000, 0x3ff, 0x1, 0x80000001, 0x3, 0x80000000, 0x9, 0x1, 0x68, 0x8, 0x7, 0x80000000, 0x9, 0x4, 0x7fe00000000, 0x1ff, 0xffffffffffffff42, 0x1, 0x0, 0xd2, 0x8, 0x200, 0x101, 0x20, 0x5053, 0x7, 0x5, 0x0, 0x2000000000, 0x80, 0x3ff, 0x2, 0xffff, 0x7, 0x472e, 0xfffffffffffffeff, 0xffffffffffffff01, 0xd86, 0x101, 0x200, 0x8, 0x800, 0x3, 0x6, 0x756, 0x495, 0xffffffffffff7fff, 0x400, 0x1, 0x23c000000, 0x0, 0x4, 0x7, 0x7fff, 0xeac8, 0x401, 0xffff, 0x100000000, 0x200, 0x7, 0x0, 0x211, 0xf9, 0x7, 0x2000, 0x8, 0x1f, 0x71c, 0x5, 0x5891, 0x7, 0x7fffffff, 0x1, 0x7, 0x6, 0x1, 0x5, 0x3, 0x0, 0x1, 0x5, 0x16, 0xfffffffffffffffb, 0x5, 0x7, 0x9, 0x7fffffff, 0xdd05, 0x400, 0x1, 0x748, 0x7, 0x7, 0x2, 0x400, 0x13, 0x3, 0x3, 0x46ca, 0xf62, 0x100000000, 0x400]}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, 0x0, 0x800, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000180), 0x4, 0x0) mknodat(r4, &(0x7f00000001c0)='./file0\x00', 0x8000, 0x18) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1686.723061] attempt to access beyond end of device 07:11:45 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x4c, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6gretap0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x4c}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, r0) [ 1686.723061] loop4: rw=2049, want=148, limit=14 [ 1686.743582] attempt to access beyond end of device [ 1686.743582] loop4: rw=2049, want=21, limit=14 [ 1686.744194] attempt to access beyond end of device [ 1686.744194] loop4: rw=0, want=21, limit=14 07:11:45 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x20000114, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1686.750406] attempt to access beyond end of device [ 1686.750406] loop5: rw=2049, want=148, limit=14 [ 1686.757082] attempt to access beyond end of device [ 1686.757082] loop5: rw=34817, want=24, limit=14 [ 1686.758090] FAULT_INJECTION: forcing a failure. [ 1686.758090] name failslab, interval 1, probability 0, space 0, times 0 [ 1686.758102] CPU: 1 PID: 10581 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1686.758109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1686.758113] Call Trace: [ 1686.758140] dump_stack+0x107/0x167 [ 1686.758154] should_fail.cold+0x5/0xa [ 1686.758167] ? create_object.isra.0+0x3a/0xa20 [ 1686.758180] should_failslab+0x5/0x20 [ 1686.758191] kmem_cache_alloc+0x5b/0x360 07:11:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x6, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1686.758207] create_object.isra.0+0x3a/0xa20 [ 1686.758217] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1686.758232] kmem_cache_alloc+0x159/0x360 [ 1686.758250] alloc_buffer_head+0x20/0x110 [ 1686.758262] alloc_page_buffers+0x14d/0x6d0 [ 1686.758279] create_empty_buffers+0x2c/0x640 [ 1686.758295] block_truncate_page+0x76c/0xab0 [ 1686.758309] ? fat_add_cluster+0x100/0x100 [ 1686.758322] ? selinux_inode_setattr+0x217/0x2e0 [ 1686.758332] ? block_write_full_page+0x290/0x290 [ 1686.758344] ? inode_newsize_ok+0x18d/0x210 [ 1686.758354] ? setattr_prepare+0x135/0x7e0 [ 1686.758369] fat_setattr+0xa19/0xf40 [ 1686.758387] ? fat_free.isra.0+0x940/0x940 [ 1686.758396] notify_change+0xba2/0x1080 [ 1686.758415] do_truncate+0x134/0x1f0 [ 1686.758425] ? file_open_root+0x440/0x440 [ 1686.758434] ? __check_object_size+0x319/0x440 [ 1686.758454] ? security_inode_permission+0xcb/0x100 [ 1686.758471] vfs_truncate+0x45b/0x5e0 [ 1686.758486] do_sys_truncate.part.0+0x122/0x140 [ 1686.758496] ? vfs_truncate+0x5e0/0x5e0 [ 1686.758506] ? ksys_write+0x1a9/0x260 [ 1686.758526] __x64_sys_truncate+0x69/0xa0 [ 1686.758538] do_syscall_64+0x33/0x40 [ 1686.758550] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1686.758558] RIP: 0033:0x7f8a1dfb0b19 [ 1686.758570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1686.758576] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1686.758589] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1686.758595] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1686.758602] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1686.758608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1686.758615] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1686.758874] attempt to access beyond end of device [ 1686.758874] loop5: rw=0, want=21, limit=14 [ 1686.999114] FAULT_INJECTION: forcing a failure. [ 1686.999114] name failslab, interval 1, probability 0, space 0, times 0 [ 1686.999248] CPU: 1 PID: 10627 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1686.999260] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 07:11:45 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x82, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1686.999268] Call Trace: [ 1686.999297] dump_stack+0x107/0x167 [ 1686.999325] should_fail.cold+0x5/0xa [ 1686.999350] ? create_object.isra.0+0x3a/0xa20 [ 1686.999374] should_failslab+0x5/0x20 [ 1686.999402] kmem_cache_alloc+0x5b/0x360 [ 1686.999434] create_object.isra.0+0x3a/0xa20 [ 1686.999455] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1686.999486] kmem_cache_alloc+0x159/0x360 [ 1686.999522] alloc_buffer_head+0x20/0x110 [ 1686.999546] alloc_page_buffers+0x14d/0x6d0 [ 1686.999580] create_empty_buffers+0x2c/0x640 07:11:45 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) symlinkat(&(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00') truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1686.999606] ? jbd2__journal_start+0xf3/0x890 [ 1686.999637] __ext4_block_zero_page_range+0x798/0x940 [ 1686.999673] ext4_truncate+0x1007/0x12b0 [ 1686.999693] ? unmap_mapping_pages+0x117/0x2a0 [ 1686.999723] ? ext4_punch_hole+0x1110/0x1110 [ 1686.999766] ext4_setattr+0x14c7/0x22c0 [ 1686.999785] ? current_time+0x1e6/0x2c0 [ 1686.999831] ? ext4_journalled_write_end+0x1240/0x1240 [ 1686.999852] notify_change+0xba2/0x1080 [ 1686.999889] do_truncate+0x134/0x1f0 [ 1686.999909] ? file_open_root+0x440/0x440 [ 1686.999928] ? security_capable+0x95/0xc0 [ 1686.999968] ? security_inode_permission+0xcb/0x100 [ 1687.000003] vfs_truncate+0x45b/0x5e0 [ 1687.000035] do_sys_truncate.part.0+0x122/0x140 [ 1687.000055] ? vfs_truncate+0x5e0/0x5e0 [ 1687.000074] ? ksys_write+0x1a9/0x260 [ 1687.000114] __x64_sys_truncate+0x69/0xa0 [ 1687.000138] do_syscall_64+0x33/0x40 [ 1687.000161] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1687.000175] RIP: 0033:0x7f8a1dfb0b19 [ 1687.000197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1687.000209] RSP: 002b:00007f8a1b505188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1687.000234] RAX: ffffffffffffffda RBX: 00007f8a1e0c4020 RCX: 00007f8a1dfb0b19 [ 1687.000247] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1687.000260] RBP: 00007f8a1b5051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1687.000273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1687.000291] R13: 00007ffd405a6aaf R14: 00007f8a1b505300 R15: 0000000000022000 [ 1687.002055] attempt to access beyond end of device [ 1687.002055] loop4: rw=2049, want=24, limit=14 [ 1687.142794] attempt to access beyond end of device [ 1687.142794] loop4: rw=1, want=21, limit=14 [ 1687.287709] attempt to access beyond end of device [ 1687.287709] loop4: rw=2049, want=148, limit=14 [ 1687.289657] attempt to access beyond end of device [ 1687.289657] loop4: rw=34817, want=24, limit=14 07:12:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x90060000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:12:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x5000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:12:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x7, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:00 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x7ffff000, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:00 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 10) 07:12:00 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0xc0, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:00 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:12:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x8, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:01 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0xec0, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:01 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'wg1\x00', {0x2, 0x0, @dev}}) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() flock(r1, 0x8) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='wg0\x00', 0x4) tgkill(r2, 0xffffffffffffffff, 0x1d) ioprio_get$pid(0x3, r2) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x3ff}], 0x0, &(0x7f0000012b00)=ANY=[]) r4 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x40, 0x40, 0x3, 0xec, 0x0, 0x40, 0x2200, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x87d3, 0x0, @perf_config_ext={0x5, 0x2}, 0xa408, 0x200000000002, 0x400, 0x9, 0x100000000, 0x4, 0x8, 0x0, 0x97d7}, r2, 0x9, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) r6 = fcntl$getown(r4, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x8, 0x79, 0x81, 0x0, 0x3, 0x11040, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000440), 0x7}, 0x1800, 0x6, 0xfffffe01, 0x3, 0x1000, 0x400, 0x8000, 0x0, 0x5, 0x0, 0x101}, r6, 0x9, r0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x4, 0x7, 0x67, 0x4, 0x0, 0x5, 0x1, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x2}, 0x20, 0x90, 0x4, 0x7, 0x80000001, 0x6, 0x8, 0x0, 0x5}, r5, 0xe, 0xffffffffffffffff, 0xf) 07:12:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x9, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:01 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0xfffffdef, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:01 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x33fe0, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:01 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 11) 07:12:01 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2000011c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xf, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1702.705808] handle_bad_sector: 3 callbacks suppressed [ 1702.705818] attempt to access beyond end of device [ 1702.705818] loop4: rw=2049, want=148, limit=14 [ 1702.734215] attempt to access beyond end of device [ 1702.734215] loop4: rw=2049, want=21, limit=14 [ 1702.747953] attempt to access beyond end of device [ 1702.747953] loop5: rw=2049, want=148, limit=14 [ 1702.758010] attempt to access beyond end of device [ 1702.758010] loop5: rw=34817, want=24, limit=14 [ 1702.766816] FAULT_INJECTION: forcing a failure. [ 1702.766816] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.766830] CPU: 1 PID: 10668 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1702.766837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1702.766841] Call Trace: [ 1702.766860] dump_stack+0x107/0x167 [ 1702.766874] should_fail.cold+0x5/0xa [ 1702.766887] ? create_object.isra.0+0x3a/0xa20 [ 1702.766903] should_failslab+0x5/0x20 [ 1702.766915] kmem_cache_alloc+0x5b/0x360 [ 1702.766930] create_object.isra.0+0x3a/0xa20 [ 1702.766940] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1702.766954] kmem_cache_alloc+0x159/0x360 [ 1702.766972] alloc_buffer_head+0x20/0x110 [ 1702.766984] alloc_page_buffers+0x14d/0x6d0 [ 1702.767000] create_empty_buffers+0x2c/0x640 [ 1702.767016] block_truncate_page+0x76c/0xab0 [ 1702.767030] ? fat_add_cluster+0x100/0x100 [ 1702.767042] ? selinux_inode_setattr+0x217/0x2e0 [ 1702.767052] ? block_write_full_page+0x290/0x290 [ 1702.767063] ? inode_newsize_ok+0x18d/0x210 [ 1702.767073] ? setattr_prepare+0x135/0x7e0 [ 1702.767089] fat_setattr+0xa19/0xf40 [ 1702.767105] ? fat_free.isra.0+0x940/0x940 [ 1702.767116] notify_change+0xba2/0x1080 [ 1702.767134] do_truncate+0x134/0x1f0 [ 1702.767144] ? file_open_root+0x440/0x440 [ 1702.767153] ? __check_object_size+0x319/0x440 [ 1702.767172] ? security_inode_permission+0xcb/0x100 [ 1702.767188] vfs_truncate+0x45b/0x5e0 [ 1702.767203] do_sys_truncate.part.0+0x122/0x140 [ 1702.767213] ? vfs_truncate+0x5e0/0x5e0 [ 1702.767223] ? ksys_write+0x1a9/0x260 [ 1702.767241] __x64_sys_truncate+0x69/0xa0 [ 1702.767254] do_syscall_64+0x33/0x40 [ 1702.767265] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1702.767273] RIP: 0033:0x7f8a1dfb0b19 [ 1702.767284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.767290] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1702.767303] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1702.767310] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1702.767316] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1702.767322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1702.767328] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1702.770863] attempt to access beyond end of device [ 1702.770863] loop5: rw=0, want=21, limit=14 [ 1702.861275] EXT4-fs (loop1): bad geometry: block count 16731469 exceeds size of device (2054 blocks) [ 1702.919488] EXT4-fs (loop1): bad geometry: block count 16731469 exceeds size of device (2054 blocks) [ 1702.972534] attempt to access beyond end of device [ 1702.972534] loop5: rw=2049, want=148, limit=14 [ 1702.986361] attempt to access beyond end of device [ 1702.986361] loop5: rw=34817, want=24, limit=14 [ 1702.997472] FAULT_INJECTION: forcing a failure. [ 1702.997472] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.997493] CPU: 0 PID: 10703 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1702.997505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1702.997511] Call Trace: [ 1702.997541] dump_stack+0x107/0x167 [ 1702.997567] should_fail.cold+0x5/0xa [ 1702.997589] ? create_object.isra.0+0x3a/0xa20 [ 1702.997611] should_failslab+0x5/0x20 [ 1702.997630] kmem_cache_alloc+0x5b/0x360 [ 1702.997657] create_object.isra.0+0x3a/0xa20 [ 1702.997677] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1702.997703] kmem_cache_alloc+0x159/0x360 [ 1702.997736] alloc_buffer_head+0x20/0x110 [ 1702.997757] alloc_page_buffers+0x14d/0x6d0 [ 1702.997786] create_empty_buffers+0x2c/0x640 [ 1702.997815] block_truncate_page+0x76c/0xab0 [ 1702.997839] ? fat_add_cluster+0x100/0x100 [ 1702.997860] ? selinux_inode_setattr+0x217/0x2e0 [ 1702.997878] ? block_write_full_page+0x290/0x290 [ 1702.997898] ? inode_newsize_ok+0x18d/0x210 [ 1702.997917] ? setattr_prepare+0x135/0x7e0 [ 1702.997944] fat_setattr+0xa19/0xf40 [ 1702.997970] ? fat_free.isra.0+0x940/0x940 [ 1702.997987] notify_change+0xba2/0x1080 [ 1702.998019] do_truncate+0x134/0x1f0 [ 1702.998037] ? file_open_root+0x440/0x440 [ 1702.998054] ? __check_object_size+0x319/0x440 [ 1702.998089] ? security_inode_permission+0xcb/0x100 [ 1702.998119] vfs_truncate+0x45b/0x5e0 [ 1702.998147] do_sys_truncate.part.0+0x122/0x140 [ 1702.998165] ? vfs_truncate+0x5e0/0x5e0 [ 1702.998182] ? ksys_write+0x1a9/0x260 [ 1702.998217] __x64_sys_truncate+0x69/0xa0 [ 1702.998238] do_syscall_64+0x33/0x40 [ 1702.998258] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1702.998271] RIP: 0033:0x7f8a1dfb0b19 [ 1702.998291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.998301] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1702.998351] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1702.998362] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1702.998374] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1702.998390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1702.998401] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1703.004281] attempt to access beyond end of device [ 1703.004281] loop5: rw=0, want=21, limit=14 07:12:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0xfdfdffff, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:12:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x6000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:12:16 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0xf, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xff}}, './file0\x00'}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmmsg$inet(r2, &(0x7f0000000b80)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0x2}], 0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC=r0, @ANYRES32=r1], 0x38}}, {{&(0x7f00000002c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000300)}, {&(0x7f0000000400)="d2d9a250c2973a14b54caa23d46ce29cf22b7e26202e46dd96590ca039798aaf23e80fc3c3bec2cf7c9e74c7e6a6de201617487965ddd88bd27e8d6a42cf187cf3390b424b32d2cbbe36901c68ef1132665c2ad8e04be4c1df6ff2850b93e883536d231b775a632543bb3c2ef366f4f743aa52c78f00f4c0ca64cc9814c19f805f33e70b92a59baa2e56723402488c3480dd2d1cbe", 0x95}, {&(0x7f00000004c0)="6a0dfd84e6f18d7698cf28c5755081c3a843c633b7ec2842247f7376c83a4788ce8612a9d3545a1a2946738adab1d8e90217b81fc30cc5b5470008487acfb0542e9cf38c4e5526be996021ad819e0370238d32fac907597fc2f6aeb333327b76bd1c3f38e2d57b19f3fd5d2de9edecedd28fa94a4a34070e8626af4e6a821fd06d26aea7bbe77e2dd3d6bb2da3f57109594f65bed68c41d9cd3503f834d0781e47592c2b390e73bfc57832d2cc49cbaa34a0991f5deecc00c15ce17af4a24b", 0xbf}, {&(0x7f0000000580)="f376fba51a5adf641680e60f2865afcee1b7a773a9b2863441f144ba47541f86d3e0e42773c1225a4c2c1cfb52a82e97f06071a35e8cc944065c1568bf72916a9211db65b194b2d8cf4f3c6c58034bfae456091cd87a0a077af24179fc6575da1539ee6e5046a7172921ab095e61d6d665517650497694", 0x77}, {&(0x7f0000000600)="b159841203b83d2eb740fcdedb281b2642f9ce9447092f2a8bdeb8c32796ba8df7f726d37181968ae25736da9f66a80f5973167eb8663d761a9ba8e8c2204323359ede921b3f5319bfb779c4f263cb", 0x4f}, {&(0x7f0000000340)="a430f29e87bd4c35f51d23ad5d493786d180dca121ef718ed4924af0072772f3d0ca90af46", 0x25}, {&(0x7f0000000b00)="0f9b77123185a28a2f63e9078df75f3190220a30f521750ebeeff642c4342804512696a1fdb4bbd1629cfaa82851b28139dada182efa81a4ade2ac223c06dff3749f65262aab497e634bf2cb", 0x4c}, {&(0x7f00000006c0)="9ca33c14837568e6f03e1a3c8d839ed964ada3112eb6000e5a9bc7e2de420c865d8a36ae2cedbebfbc6f1a313123cd9a95f705b00789c3f2934eba86c2478ad96ad3b10af4872527bc02", 0x4a}], 0x8}}, {{&(0x7f00000007c0)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000800)="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", 0xfb}, {&(0x7f0000000900)="dc5f21fc8ae2afa64f7bf4daa9e4f59c9882a01a47777c075d97bfc386dd0754f6276393a42660282067ac93f9bdc5f492ed3014a488ee3c27fab57448f8c0b603e11e72a19aecb0d8331cb4bf961dfa86c8a527d827548a4a814672b80433869a9732f4935f580d419da9dade30a92c71a3bcc65041728334887aa803d3bb6a1c866114ec49e54f855d775a208a99e702165622623ae8e022ee4016cec1dcfb10b5b3ca371b2538d252d60f0e6876a4997e422da6acfc3108feaf706d22f42447", 0xc1}, {&(0x7f0000000a00)="a8dc7a4acb002b07938c864ba9f941c8088e6d90013c3cca60f1c2ae7a4e8ba57e2ec3418bc2b4fda013e83014ecd47b0555e00ac6001fa6f2b781649202872e03cca9a6485124703d85ab04db18eca59b64475c4a60aaabdab73e90637b60e327ced4063e0cc4ad824699766f275986603fbc582ed06e3657eb5113af18af789e7ef3c2ee31ef3c9970b4c2e9336b3fc5676f7301681b503268b8a4f587b53d3fc904053ae5a174ab2c43b3768489d3207b8d7bff8e434819ffe2b2351186235a413c513d562844d1c9762ae5309c32bd96c603027aaa7b0d88008527795acb9e1e342dba3ca4f94f6f056a112cce091bca", 0xf2}], 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="4c00000000000000000000000700000001440c89c0000003ff000000014420d31000000b9f00ebff09000000030001e9ff000000060000a0a100000006070f01ac141414e0000001000000000000000083f6a0014421626873d8ac1e128ba8c2885011ceaed6d91dfc83f4611efaa27f10dc0a8b972765c4a9269882dffb2e3d812463fbb8f1e0e971adad08176044777a29e8a33757f89b5a35466ff6820b136952bb025e395e8e0e"], 0x50}}], 0x3, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/pm_freeze_timeout', 0x64001, 0x40) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r1) sendmsg$NL80211_CMD_SET_CHANNEL(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r5, 0x800, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x6c, 0x52}}}}, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x8044}, 0x20040004) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000000), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$int_out(r2, 0x5460, &(0x7f0000000080)) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x4) 07:12:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00'}) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESOCT=r1]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x4000000010000, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r6, 0xa0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r7, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x140000, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB="2c7766646e6f3de2ed431ff02bc321a88e206fddd1ce446fe3cf59a0a2b6ff5b8d4e242903906d0ee7322149576aa009e59e7d54568d8a537fa6d1bb28b34a52d4b9e0", @ANYRESHEX=r3, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c667363616368652c63616368653d6c6f6f73652c756e616d653d5d2a3a7b2d245e24872d2324406d23251e3a232c6163636573733d757365722c667363616368652c6163636573733d636c69656e742c6163636573733d636c69656e742c6d6561737572652c7569643d", @ANYRESDEC=r7, @ANYBLOB=',smackfstransmute=,rootcontext=system_u,uid<', @ANYRESDEC=r8, @ANYBLOB=',\x00']) copy_file_range(r5, 0x0, r4, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:12:16 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x7ffff000, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xf0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:16 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 12) [ 1718.143396] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=10721 comm=syz-executor.7 [ 1718.200964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=10721 comm=syz-executor.7 07:12:16 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0xfffffdef, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1718.204358] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1718.221632] attempt to access beyond end of device [ 1718.221632] loop5: rw=2049, want=148, limit=14 [ 1718.237551] attempt to access beyond end of device [ 1718.237551] loop5: rw=34817, want=24, limit=14 [ 1718.240173] FAULT_INJECTION: forcing a failure. [ 1718.240173] name failslab, interval 1, probability 0, space 0, times 0 [ 1718.240195] CPU: 0 PID: 10727 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1718.240206] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 07:12:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x300, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1718.240213] Call Trace: [ 1718.240241] dump_stack+0x107/0x167 [ 1718.240268] should_fail.cold+0x5/0xa [ 1718.240293] ? create_object.isra.0+0x3a/0xa20 [ 1718.240317] should_failslab+0x5/0x20 [ 1718.240346] kmem_cache_alloc+0x5b/0x360 07:12:16 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x10, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:16 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000280)=""/217, 0xd9}], 0x1, 0x0, 0x0) [ 1718.240375] create_object.isra.0+0x3a/0xa20 [ 1718.240395] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1718.240423] kmem_cache_alloc+0x159/0x360 [ 1718.240457] alloc_buffer_head+0x20/0x110 [ 1718.240479] alloc_page_buffers+0x14d/0x6d0 [ 1718.240509] create_empty_buffers+0x2c/0x640 [ 1718.240540] block_truncate_page+0x76c/0xab0 [ 1718.240564] ? fat_add_cluster+0x100/0x100 [ 1718.240586] ? selinux_inode_setattr+0x217/0x2e0 [ 1718.240605] ? block_write_full_page+0x290/0x290 [ 1718.240626] ? inode_newsize_ok+0x18d/0x210 [ 1718.240645] ? setattr_prepare+0x135/0x7e0 [ 1718.240673] fat_setattr+0xa19/0xf40 [ 1718.240701] ? fat_free.isra.0+0x940/0x940 [ 1718.240719] notify_change+0xba2/0x1080 [ 1718.240752] do_truncate+0x134/0x1f0 [ 1718.240771] ? file_open_root+0x440/0x440 [ 1718.240789] ? __check_object_size+0x319/0x440 [ 1718.240825] ? security_inode_permission+0xcb/0x100 [ 1718.240856] vfs_truncate+0x45b/0x5e0 [ 1718.240885] do_sys_truncate.part.0+0x122/0x140 [ 1718.240904] ? vfs_truncate+0x5e0/0x5e0 [ 1718.240921] ? ksys_write+0x1a9/0x260 [ 1718.240957] __x64_sys_truncate+0x69/0xa0 [ 1718.240980] do_syscall_64+0x33/0x40 [ 1718.241002] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1718.241016] RIP: 0033:0x7f8a1dfb0b19 [ 1718.241036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1718.241047] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1718.241070] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1718.241082] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1718.241094] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1718.241106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1718.241118] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1718.252204] attempt to access beyond end of device [ 1718.252204] loop5: rw=0, want=21, limit=14 07:12:16 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 13) 07:12:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x480, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:16 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0xf, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1718.666001] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1718.689263] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=10770 comm=syz-executor.6 [ 1718.698196] attempt to access beyond end of device [ 1718.698196] loop5: rw=2049, want=148, limit=14 [ 1718.708221] attempt to access beyond end of device [ 1718.708221] loop5: rw=34817, want=24, limit=14 [ 1718.715131] FAULT_INJECTION: forcing a failure. [ 1718.715131] name failslab, interval 1, probability 0, space 0, times 0 [ 1718.715157] CPU: 0 PID: 10761 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1718.715170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1718.715178] Call Trace: [ 1718.715208] dump_stack+0x107/0x167 [ 1718.715236] should_fail.cold+0x5/0xa [ 1718.715260] ? mempool_alloc+0x148/0x360 [ 1718.715277] ? mempool_free_pages+0x20/0x20 [ 1718.715300] should_failslab+0x5/0x20 [ 1718.715320] kmem_cache_alloc+0x5b/0x360 [ 1718.715347] ? mempool_free_pages+0x20/0x20 [ 1718.715366] mempool_alloc+0x148/0x360 [ 1718.715403] ? mempool_resize+0x7d0/0x7d0 [ 1718.715433] ? perf_trace_lock+0xac/0x490 [ 1718.715478] bio_alloc_bioset+0x36e/0x600 [ 1718.715507] ? bvec_alloc+0x2f0/0x2f0 [ 1718.715536] ? block_truncate_page+0x76c/0xab0 [ 1718.715570] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 1718.715601] ll_rw_block+0x1e7/0x230 [ 1718.715630] block_truncate_page+0x7d6/0xab0 [ 1718.715656] ? fat_add_cluster+0x100/0x100 [ 1718.715679] ? block_write_full_page+0x290/0x290 [ 1718.715701] ? inode_newsize_ok+0x18d/0x210 [ 1718.715723] ? setattr_prepare+0x135/0x7e0 [ 1718.715752] fat_setattr+0xa19/0xf40 [ 1718.715781] ? fat_free.isra.0+0x940/0x940 [ 1718.715800] notify_change+0xba2/0x1080 [ 1718.715835] do_truncate+0x134/0x1f0 [ 1718.715856] ? file_open_root+0x440/0x440 [ 1718.715875] ? io_schedule_timeout+0x140/0x140 [ 1718.715913] ? security_inode_permission+0xcb/0x100 [ 1718.715946] vfs_truncate+0x45b/0x5e0 [ 1718.715977] do_sys_truncate.part.0+0x122/0x140 [ 1718.715997] ? vfs_truncate+0x5e0/0x5e0 [ 1718.716016] ? ksys_write+0x1a9/0x260 [ 1718.716054] __x64_sys_truncate+0x69/0xa0 [ 1718.716077] do_syscall_64+0x33/0x40 [ 1718.716099] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1718.716114] RIP: 0033:0x7f8a1dfb0b19 [ 1718.716136] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1718.716147] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1718.716172] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1718.716185] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1718.716198] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1718.716210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1718.716223] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1718.733089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=10773 comm=syz-executor.6 [ 1718.740593] attempt to access beyond end of device [ 1718.740593] loop5: rw=0, want=21, limit=14 07:12:30 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x500, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:30 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)='./file0/file0\x00', 0xe, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) setxattr$security_capability(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0), &(0x7f0000000300)=@v1={0x1000000, [{0x7ff, 0x200}]}, 0xc, 0x0) 07:12:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0xffffe000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:12:30 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 14) 07:12:30 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x10, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x7000000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:12:30 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x11, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:30 executing program 1: r0 = creat(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000180)={0x3, 0x0, 0x0, &(0x7f00000000c0)}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000280)=ANY=[@ANYBLOB="c1bcd41866ee6840ab58", @ANYRES32]) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r3, 0xa0) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x2f, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYRESHEX=r1], 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000000140)={0x0, 0x6}) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x120) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x2, 0x3f, 0x3, 0x3, 0x0, 0x2, 0x40000, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x800, 0x2}, 0x88, 0x1, 0x5, 0x6, 0x9, 0x0, 0x401, 0x0, 0x400}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1b) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x20, 0x8, 0x2, 0x12c6, 0x3, 0x3, 0x6, 0x25b, 0x40, 0xfc, 0x5, 0x0, 0x38, 0x1, 0x3ff, 0x7, 0x9}, [{0x6, 0x5, 0x7, 0x6, 0xc9, 0x100, 0x1, 0x8}, {0x6474e551, 0x3f, 0x4, 0x4, 0x53482501, 0x3, 0x5, 0x4}], "8e6e2ce1c1c4dfe96a9250ca1c1cebb9b8d94520a829b5ead9f227a39b6d376418dfcd955593757e7921a51b97e0a70295baef8889961e74473ca49ef0f822de50195f67794690abbbe2cfbc0548edb2820919b1", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x604) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000001c0)={'xfrm0\x00'}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000120001010000030000000053546d6f1784b84c2c10ac7c13be0000000000000028e42fdc24952bfa8e77e4cad4e615"], 0x14}}, 0x48840) fsconfig$FSCONFIG_SET_FD(r4, 0x5, &(0x7f0000000100)='\x00', 0x0, 0xffffffffffffffff) 07:12:30 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x600, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:30 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:12:30 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x12, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:30 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) (fail_nth: 15) 07:12:30 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x11, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:30 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x700, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x900, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1732.396887] attempt to access beyond end of device [ 1732.396887] loop4: rw=2049, want=148, limit=14 [ 1732.401928] attempt to access beyond end of device [ 1732.401928] loop4: rw=34817, want=24, limit=14 [ 1732.403010] attempt to access beyond end of device [ 1732.403010] loop4: rw=0, want=21, limit=14 [ 1732.408541] attempt to access beyond end of device [ 1732.408541] loop4: rw=0, want=21, limit=14 [ 1732.408850] attempt to access beyond end of device [ 1732.408850] loop5: rw=2049, want=148, limit=14 [ 1732.413927] attempt to access beyond end of device [ 1732.413927] loop5: rw=34817, want=24, limit=14 [ 1732.417659] FAULT_INJECTION: forcing a failure. [ 1732.417659] name failslab, interval 1, probability 0, space 0, times 0 [ 1732.417680] CPU: 1 PID: 10791 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1732.417691] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1732.417697] Call Trace: [ 1732.417724] dump_stack+0x107/0x167 [ 1732.417748] should_fail.cold+0x5/0xa [ 1732.417771] ? create_object.isra.0+0x3a/0xa20 [ 1732.417793] should_failslab+0x5/0x20 [ 1732.417811] kmem_cache_alloc+0x5b/0x360 [ 1732.417839] create_object.isra.0+0x3a/0xa20 [ 1732.417858] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1732.417885] kmem_cache_alloc+0x159/0x360 [ 1732.417910] ? mempool_free_pages+0x20/0x20 [ 1732.417928] mempool_alloc+0x148/0x360 [ 1732.417956] ? mempool_resize+0x7d0/0x7d0 [ 1732.417984] ? perf_trace_lock+0xac/0x490 [ 1732.418024] bio_alloc_bioset+0x36e/0x600 [ 1732.418050] ? bvec_alloc+0x2f0/0x2f0 [ 1732.418081] ? block_truncate_page+0x76c/0xab0 [ 1732.418111] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 1732.418141] ll_rw_block+0x1e7/0x230 [ 1732.418165] block_truncate_page+0x7d6/0xab0 [ 1732.418189] ? fat_add_cluster+0x100/0x100 [ 1732.418211] ? block_write_full_page+0x290/0x290 [ 1732.418231] ? inode_newsize_ok+0x18d/0x210 [ 1732.418249] ? setattr_prepare+0x135/0x7e0 [ 1732.418277] fat_setattr+0xa19/0xf40 [ 1732.418303] ? fat_free.isra.0+0x940/0x940 [ 1732.418321] notify_change+0xba2/0x1080 [ 1732.418352] do_truncate+0x134/0x1f0 [ 1732.418370] ? file_open_root+0x440/0x440 [ 1732.418387] ? __check_object_size+0x319/0x440 [ 1732.418423] ? security_inode_permission+0xcb/0x100 [ 1732.418453] vfs_truncate+0x45b/0x5e0 [ 1732.418480] do_sys_truncate.part.0+0x122/0x140 [ 1732.418499] ? vfs_truncate+0x5e0/0x5e0 [ 1732.418515] ? ksys_write+0x1a9/0x260 [ 1732.418550] __x64_sys_truncate+0x69/0xa0 [ 1732.418572] do_syscall_64+0x33/0x40 [ 1732.418593] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1732.418606] RIP: 0033:0x7f8a1dfb0b19 [ 1732.418626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1732.418637] RSP: 002b:00007f8a1b526188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 1732.418659] RAX: ffffffffffffffda RBX: 00007f8a1e0c3f60 RCX: 00007f8a1dfb0b19 [ 1732.418671] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020003200 [ 1732.418682] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1732.418703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1732.418715] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 [ 1732.421494] attempt to access beyond end of device [ 1732.421494] loop5: rw=0, want=21, limit=14 [ 1732.690264] attempt to access beyond end of device [ 1732.690264] loop5: rw=2049, want=148, limit=14 [ 1732.697673] attempt to access beyond end of device [ 1732.697673] loop4: rw=2049, want=148, limit=14 [ 1732.705332] attempt to access beyond end of device [ 1732.705332] loop5: rw=34817, want=24, limit=14 [ 1732.712932] FAULT_INJECTION: forcing a failure. [ 1732.712932] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1732.712953] CPU: 0 PID: 10814 Comm: syz-executor.5 Not tainted 5.10.154 #1 [ 1732.712964] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1732.712971] Call Trace: [ 1732.713000] dump_stack+0x107/0x167 [ 1732.713024] should_fail.cold+0x5/0xa [ 1732.713052] _copy_to_user+0x2e/0x180 [ 1732.713081] simple_read_from_buffer+0xcc/0x160 [ 1732.713107] proc_fail_nth_read+0x198/0x230 [ 1732.713130] ? proc_sessionid_read+0x230/0x230 [ 1732.713149] ? security_file_permission+0x24e/0x570 [ 1732.713168] ? perf_trace_initcall_start+0x101/0x380 [ 1732.713198] ? proc_sessionid_read+0x230/0x230 [ 1732.713217] vfs_read+0x228/0x580 [ 1732.713246] ksys_read+0x12d/0x260 [ 1732.713267] ? __ia32_sys_pwrite64+0x230/0x230 [ 1732.713295] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1732.713322] do_syscall_64+0x33/0x40 [ 1732.713343] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1732.713357] RIP: 0033:0x7f8a1df6369c [ 1732.713383] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1732.713393] RSP: 002b:00007f8a1b526170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1732.713415] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f8a1df6369c [ 1732.713428] RDX: 000000000000000f RSI: 00007f8a1b5261e0 RDI: 0000000000000008 [ 1732.713439] RBP: 00007f8a1b5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1732.713451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1732.713462] R13: 00007ffd405a6aaf R14: 00007f8a1b526300 R15: 0000000000022000 07:12:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x8060000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:12:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0xfffffdfd, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:12:43 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:12:43 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x13, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:43 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x12, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:43 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x10000, 0x44) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:12:43 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xf00, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:43 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:12:43 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x600, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:43 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x8004, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:43 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x14, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:43 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x13, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:44 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x4c0c02, 0x180) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:12:44 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x2) [ 1745.402165] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1745.402259] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1745.456511] handle_bad_sector: 5 callbacks suppressed [ 1745.456528] attempt to access beyond end of device [ 1745.456528] loop4: rw=2049, want=148, limit=14 [ 1745.460071] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1745.460336] attempt to access beyond end of device [ 1745.460336] loop4: rw=34817, want=24, limit=14 [ 1745.461052] attempt to access beyond end of device [ 1745.461052] loop4: rw=0, want=21, limit=14 [ 1745.462217] attempt to access beyond end of device [ 1745.462217] loop1: rw=2049, want=148, limit=14 [ 1745.469618] attempt to access beyond end of device [ 1745.469618] loop4: rw=34817, want=24, limit=14 [ 1745.470599] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1745.479235] attempt to access beyond end of device [ 1745.479235] loop1: rw=34817, want=24, limit=14 [ 1745.481195] attempt to access beyond end of device [ 1745.481195] loop1: rw=0, want=21, limit=14 07:12:44 executing program 1: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x12, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1745.508302] attempt to access beyond end of device [ 1745.508302] loop5: rw=2049, want=148, limit=14 [ 1745.530897] attempt to access beyond end of device [ 1745.530897] loop5: rw=34817, want=24, limit=14 [ 1745.533568] attempt to access beyond end of device [ 1745.533568] loop5: rw=0, want=21, limit=14 07:12:44 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x15, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1745.805169] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1745.809187] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 07:12:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xf000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:59 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x80040, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:12:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x2, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:12:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0xfdfdffff, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:12:59 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x14, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:59 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r2, 0x80286722, &(0x7f0000000100)={&(0x7f0000000280)=""/187, 0xbb, 0x8000, 0x4}) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:12:59 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x16, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:59 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, 0x0}, 0x20000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003580), 0x8000, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/224, 0xe0, 0x6) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_ASSOCIATE(r1, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x7efd58750625b022}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x1c4, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @void}}, [@crypto_settings=[@NL80211_ATTR_PMK={0x102, 0xfe, "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"}, @NL80211_ATTR_CONTROL_PORT_NO_PREAUTH={0x4}, @NL80211_ATTR_CONTROL_PORT_NO_PREAUTH={0x4}, @NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT={0x4}, @NL80211_ATTR_AKM_SUITES={0x18, 0x4c, [0xfac12, 0xfac02, 0xfac07, 0xfac03, 0xfac04]}], @NL80211_ATTR_PREV_BSSID={0xa}, @NL80211_ATTR_VHT_CAPABILITY={0x10, 0x9d, {0xc000000, {0x1, 0x1, 0x6, 0x5}}}, @NL80211_ATTR_VHT_CAPABILITY={0x10, 0x9d, {0x1, {0x1, 0x7fff, 0x2, 0x1}}}, @crypto_settings=[@NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac08}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac0d}, @NL80211_ATTR_CONTROL_PORT={0x4}], @NL80211_ATTR_DISABLE_VHT={0x4}, @NL80211_ATTR_DISABLE_HT={0x4}, @crypto_settings=[@NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x18, 0x49, [0xfac00, 0xfac02, 0xfac0b, 0xfac05, 0xfac0a]}, @NL80211_ATTR_CONTROL_PORT_NO_PREAUTH={0x4}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac09}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x7b}], @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x20040891}, 0x44010) 07:12:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x30000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:59 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x18, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:59 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r2, 0xa0) recvmmsg$unix(r2, &(0x7f0000000700)=[{{&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000280)=""/83, 0x53}, {&(0x7f0000000300)=""/253, 0xfd}], 0x2, &(0x7f0000000400)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000000480), 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/223, 0xdf}, {&(0x7f0000000600)=""/180, 0xb4}], 0x2}}], 0x2, 0x2000, &(0x7f0000000780)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:12:59 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x15, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x34000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:12:59 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x19, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:12:59 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x5c}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f00000000c0)=0x8) copy_file_range(r2, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r3, 0xa0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x80000000, 0x1, 0x0, 0x1}) 07:12:59 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:12:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x80000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1760.821291] handle_bad_sector: 10 callbacks suppressed [ 1760.821313] attempt to access beyond end of device [ 1760.821313] loop4: rw=2049, want=148, limit=14 [ 1760.825458] attempt to access beyond end of device [ 1760.825458] loop4: rw=34817, want=24, limit=14 [ 1760.825848] attempt to access beyond end of device [ 1760.825848] loop4: rw=0, want=21, limit=14 [ 1760.834294] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10917 comm=syz-executor.1 [ 1760.835219] attempt to access beyond end of device [ 1760.835219] loop4: rw=34817, want=148, limit=14 [ 1760.835866] attempt to access beyond end of device [ 1760.835866] loop4: rw=34817, want=24, limit=14 [ 1760.853049] attempt to access beyond end of device [ 1760.853049] loop5: rw=2049, want=24, limit=14 [ 1760.862881] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10925 comm=syz-executor.1 [ 1760.873063] attempt to access beyond end of device [ 1760.873063] loop5: rw=2049, want=21, limit=14 [ 1760.947462] attempt to access beyond end of device [ 1760.947462] loop4: rw=2049, want=148, limit=14 [ 1760.988453] attempt to access beyond end of device [ 1760.988453] loop5: rw=1, want=21, limit=14 [ 1761.002109] attempt to access beyond end of device [ 1761.002109] loop4: rw=34817, want=24, limit=14 [ 1761.036340] EXT4-fs warning (device sda): __ext4_ioctl:884: Setting inode version is not supported with metadata_csum enabled. [ 1761.354083] EXT4-fs warning (device sda): __ext4_ioctl:884: Setting inode version is not supported with metadata_csum enabled. 07:13:13 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:13:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x3, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:13:13 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x73, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:13 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f00000001c0)="cbf5e5b4720c6751a70eb8a3a5137636c6642633ceed368272dfa2c950fa647edd147431d35112e049415e4e280ac867828679ee0bcdb463331c215878e6e8b527a1eb3459f18d09ca21631db4e3218639ffe01e37f79d807b75315449b1bf2e13823f3a73e335d8fe0b1d797a148dbcb471ef98b7982113327102c0e3af6cea36aeca4771231ef8bc9d7eee3fe116892afa2cc29b0a12f13f989084585f97a1080a50f84bfc44887bf87dd771ff5f200c48ba17f948fe6e18c1c28bc6b2512cc5721c814e13594b27794c1113288d7c675924fd9f405efbd2b537c62f27", 0xde, 0x3}, {&(0x7f00000002c0)="ab87dabefa7205be3408cc204768e899432af4c916a27b4c312b11bdf053c2b5bcb19d8d1194309f20c5555cc1225bd15233070000010000000000c9120d1c4b05b7c77bd396", 0x46, 0x4}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1, 0xc86, 0x4236185c, 0x3, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:13:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x400300, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:13:13 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x16, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:13 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6, @multicast}, 0x10) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) llistxattr(&(0x7f0000000180)='./file1\x00', &(0x7f0000000280)=""/4096, 0x1000) 07:13:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0xffffe000, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:13:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xf0ffff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:13:13 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x18, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1774.916303] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=10972 comm=syz-executor.7 [ 1774.925422] handle_bad_sector: 9 callbacks suppressed [ 1774.925431] attempt to access beyond end of device [ 1774.925431] loop5: rw=2049, want=148, limit=14 [ 1774.929790] attempt to access beyond end of device [ 1774.929790] loop5: rw=34817, want=24, limit=14 [ 1774.934985] attempt to access beyond end of device [ 1774.934985] loop5: rw=0, want=21, limit=14 [ 1774.943517] attempt to access beyond end of device [ 1774.943517] loop5: rw=0, want=21, limit=14 07:13:13 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x102, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x1000000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1774.948319] FAT-fs (loop4): bogus number of reserved sectors [ 1774.948333] FAT-fs (loop4): Can't find a valid FAT filesystem 07:13:13 executing program 5: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f0000000780)=ANY=[@ANYBLOB="90011132688b7396da1613eb0f5f6f892800", @ANYRES16=r0, @ANYBLOB="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"], 0x190}, 0x1, 0x0, 0x0, 0x4}, 0x10) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) name_to_handle_at(r1, &(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0), 0x0) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = open$dir(&(0x7f00000004c0)='./file1\x00', 0x60000, 0x140) openat(r3, &(0x7f00000002c0)='./file1\x00', 0x20000, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1/file0\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r2, 0x0, 0x4000000010000, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x8) copy_file_range(r6, 0x0, r5, 0x0, 0x800, 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x31) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1774.956268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=10972 comm=syz-executor.7 [ 1775.017148] attempt to access beyond end of device [ 1775.017148] loop1: rw=2049, want=148, limit=14 07:13:13 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x19, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:13 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x73, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:13 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x104, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020801000470008000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="2df45763b47c6f9e26763a1b05985cc514c87d1ed524c47f901e00c1fbc949863abfb98000"/57]) mkdirat(0xffffffffffffffff, 0x0, 0x48) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x28) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x20d315) [ 1775.090911] attempt to access beyond end of device [ 1775.090911] loop1: rw=34817, want=24, limit=14 [ 1775.096936] attempt to access beyond end of device [ 1775.096936] loop1: rw=0, want=21, limit=14 [ 1775.219174] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=11010 comm=syz-executor.6 [ 1775.261238] FAT-fs (loop5): Unrecognized mount option "devlink" or missing value [ 1775.321744] FAT-fs (loop1): Unrecognized mount option "-ôWc´|ož&v:˜\ÅÈ}Õ$Ä" or missing value [ 1775.385762] FAT-fs (loop5): Unrecognized mount option "devlink" or missing value [ 1775.394267] FAT-fs (loop4): bogus number of reserved sectors [ 1775.395832] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1775.705799] FAT-fs (loop1): Unrecognized mount option "-ôWc´|ož&v:˜\ÅÈ}Õ$Ä" or missing value 07:13:27 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x2000000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:13:27 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) readlinkat(r0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000280)=""/134, 0x86) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:13:27 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x82, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0xfffffdfd, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:13:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020801000470008000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="2df45763b47c6f9e26763a1b05985cc514c87d1ed524c47f901e00c1fbc949863abfb98000"/57]) mkdirat(0xffffffffffffffff, 0x0, 0x48) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x28) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x20d315) 07:13:27 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x108, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x4, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:13:27 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000100)='./file1\x00') chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1789.608755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=130 sclass=netlink_route_socket pid=11043 comm=syz-executor.6 [ 1789.614363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=130 sclass=netlink_route_socket pid=11056 comm=syz-executor.6 [ 1789.639596] FAT-fs (loop1): Unrecognized mount option "-ôWc´|ož&v:˜\ÅÈ}Õ$Ä" or missing value [ 1789.671269] attempt to access beyond end of device [ 1789.671269] loop5: rw=2049, want=148, limit=14 [ 1789.683320] attempt to access beyond end of device [ 1789.683320] loop5: rw=34817, want=24, limit=14 [ 1789.688758] attempt to access beyond end of device [ 1789.688758] loop5: rw=0, want=21, limit=14 [ 1789.724225] attempt to access beyond end of device [ 1789.724225] loop4: rw=2049, want=148, limit=14 [ 1789.728657] attempt to access beyond end of device [ 1789.728657] loop4: rw=34817, want=24, limit=14 [ 1789.729037] attempt to access beyond end of device [ 1789.729037] loop4: rw=0, want=21, limit=14 07:13:28 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x102, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x3000000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1789.747468] attempt to access beyond end of device [ 1789.747468] loop4: rw=34817, want=148, limit=14 07:13:28 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x175400, 0x0) fspick(r0, &(0x7f0000002940)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x1c7b, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="288b143d36c7a749ed25ce65ff0fab265621ea281f770c8e09ef57769c8e400a492ff13d6376b59dc75091391537c5a93202604ec553b7ca65302d3234f9efed421634a4462589a7ea7e09d7e1ce", 0x4e, 0x6}, {&(0x7f0000000300), 0x0, 0x127}], 0x4402, &(0x7f00000003c0)={[{@dots}, {@nodots}, {@nodots}, {@fat=@errors_remount}, {@dots}, {@fat=@codepage={'codepage', 0x3d, '869'}}, {@dots}]}) preadv2(r4, &(0x7f0000002880)=[{&(0x7f0000000440)=""/15, 0xf}, {&(0x7f0000000480)=""/133, 0x85}, {&(0x7f0000000540)=""/179, 0xb3}, {&(0x7f0000000600)=""/210, 0xd2}, {&(0x7f0000000700)=""/22, 0x16}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/170, 0xaa}, {&(0x7f0000001800)=""/61, 0x3d}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000002840)=""/33, 0x21}], 0xa, 0x7fffffff, 0x94d, 0x6) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r3, 0x0, 0x800, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8914, &(0x7f0000000140)={'ip6gretap0\x00'}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r6, 0x40189429, &(0x7f0000000100)={0x0, 0x100, 0x7ff}) truncate(&(0x7f0000003200)='./file1\x00', 0x3) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r7, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r7, 0xa0) getsockopt$IP_VS_SO_GET_SERVICE(r7, 0x0, 0x483, &(0x7f0000002980), &(0x7f0000000380)=0x68) 07:13:28 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x103, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x4000000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:13:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000240)='./file1\x00', 0x0, 0x6, &(0x7f00000013c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="fb17a7859fc974df9367078c3f88149dad3f36cb77005ab862d96687c45989dc48cb35f914846bac6b07b171afcbfdfb", 0x30, 0x6}, {&(0x7f0000001300)="3dc42b1d3ff2c559c3e89c500389ab942c70c73b543b", 0x16, 0x3}, {&(0x7f0000001340)="4ed21dcb7e4413c1eceacadaa8e3b9b976c6ceda57e63c993f29a08eb480aa6d6d82b9fc7c75ba294342624ecf50e0dc7556b05a8d699a478b30ff7c5dfdc884fba817d89fcfe402e961a41516c5ebb3d709b97c2c99529230a4b7cd7e62c58f83c1a8d3895886bc6ce7", 0x6a, 0xfffffffffffffffa}], 0x0, &(0x7f0000001480)=ANY=[@ANYRES32, @ANYBLOB="b0603da4ce14b354ecb924f59313296b949f12e9aad354a90d6d88544efcee1cf49b8406da5a1525aa3fd707c01fb5743944e58a0458433625cb56dacca72649190bca"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) ioctl$FAT_IOCTL_GET_VOLUME_ID(r2, 0x80047213, &(0x7f00000001c0)) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r3, 0xa0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) renameat2(r3, &(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000200)='./file1\x00', 0x2) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001600)={&(0x7f0000001580)={0x54, 0x1f, 0x20, 0x70bd26, 0x25dfdbfd, {0x20}, [@nested={0x3d, 0x53, 0x0, 0x1, [@typed={0xc, 0x45, 0x0, 0x0, @u64=0x5}, @generic="83f011b5ab482b6f954e9d13bbe9cb945dae86e7cf0f4462ea0f7b5a766f200ad7a91636050e762b532d32e60a"]}]}, 0x54}, 0x1, 0x0, 0x0, 0x814}, 0x4040000) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r6, 0x0, r5, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40000, 0x8e) 07:13:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x2, 0x1e, 0x1b9, &(0x7f0000000200)}) [ 1789.978720] FAT-fs (loop4): Unrecognized mount option "ÿÿÿÿ°`=¤Î³Tì¹$õ“)k”ŸéªÓT©mˆTNüîô›„ÚZ%ª?×Àµt9DåŠXC6%ËVÚ̧&I Ê" or missing value [ 1790.044550] attempt to access beyond end of device [ 1790.044550] loop5: rw=2049, want=148, limit=14 [ 1790.056088] attempt to access beyond end of device [ 1790.056088] loop5: rw=34817, want=24, limit=14 [ 1790.111012] attempt to access beyond end of device [ 1790.111012] loop5: rw=0, want=21, limit=14 [ 1790.207018] FAT-fs (loop4): Unrecognized mount option "ÿÿÿÿ°`=¤Î³Tì¹$õ“)k”ŸéªÓT©mˆTNüîô›„ÚZ%ª?×Àµt9DåŠXC6%ËVÚ̧&I Ê" or missing value 07:13:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x3, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:13:42 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x104, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:42 executing program 4: ioctl$CDROMREADTOCENTRY(0xffffffffffffffff, 0x5306, &(0x7f00000002c0)={0x7, 0x0, 0x9, 0x3, @lba=0x7, 0x20}) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617470000400f82398dd4e79cfce", 0x17}, {0x0, 0x0, 0xeef}], 0x200c10, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105542, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) sendmsg$nl_generic(r1, &(0x7f00000009c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000980)={&(0x7f0000000400)={0x54c, 0x1d, 0x2, 0x70bd2b, 0x25dfdbfd, {0x12}, [@typed={0x8, 0x37, 0x0, 0x0, @ipv4=@broadcast}, @nested={0x2e6, 0x2c, 0x0, 0x1, [@generic="0cc3f4c0589d07f77869b7c4a343e976690dd26d700901e842b7f70702faccedcb9ce9b7464bf76944", @generic="f12f866406bfd92737a83d48ccf83f7c602cf603377adf57db621445692f31366b3bcd2c7fb100eac621c156d2b2e578fa0ffa1a81d5256fb7035d6112ae56bccec8a090d0f1b7fee45f0beedcc70421f95bd0ccc9440ec7e606fb9dbaed2c114392c49d1c896603c9b6cc5e09db0a680d4f8af615adbace1f05ff", @typed={0x8, 0xe, 0x0, 0x0, @uid=r5}, @typed={0x14, 0x8a, 0x0, 0x0, @ipv6=@loopback}, @generic="2e0bd55be84c3c163e086f3af4e98ceabf4eda29c617de6094779d726bceff8ab5092e3da29b84ae3d1917f40298d70d5aee2186a97edf349ad8648d80b60f1d122ee729bbc4b6bb792c22c657d2f2437b4910072a54ce719d93d45d37be1f3077442aae80b8d6bf476e80c107fee974b51c7785035aeec9606fe2b348757fb5f5fc9089339ba856c2fb39507ebb15cda3fdfc45c86b7180ddf9217c163316a05b65f2c687a003471b8f335b41e0d050822ab41aa5b9e608d0c06caa7a71f6f743764e2443440772292b9069c6eb2eae392418b093c387601c6bf71c3915cf031a9aae512d00b769c3facda985b3e3", @typed={0x4d, 0x8, 0x0, 0x0, @binary="dafd547e61b2cdfe3d667e5e17766673e851a43fb12ba3a4227b9ffe05a31f1bc1c3a50a9b1f04e7a7c46e69acf4728d15eb51a79ec8f670dc3cd0fd6af367320c777513f71f7582c2"}, @generic="973109a79cf746a719136fe83ff0e163435a1b7b51256115eeb52059f43b89d30725fa26ba09253f7099b32bd7f1fb68c2c557cab2c0ce554f328f5fa8e65d9f966cd4a6551d28c5980e7f638b13977d81f21d9a6b6591ed85551beaac6dd0", @generic="30de652a21846a54ee3e1a2a9ba50609a7322cb7c89b6dbfacb7dc3268e17c1eb52b68498fc4572f4d8b595002ca239e656d87752a4afa5d6fa12df5c4027b4f8cee027d233fdd3de2373c0da6e5bef023c3a85e58b00825cc37345761224d0109544b8ec276174966f43ae935033620bd59e6a87105b90a59283ee6c4794d2bb1030e6f"]}, @nested={0x247, 0x47, 0x0, 0x1, [@generic="4150698e31f46f1dbccdfe8b636b5a6817a7f39c2afb4e948a9a56a3682f94d5e675b3ef6f58357b06206cb3951064dd0f2163c8dee770d39c1d4ba59866f5ba94db499fd755c65ca03981dab9596389cd284471b839dd881af777fbf9555c653a3bf37f383b2742ce10aaa3b9746d5da80d37955d453f7ade6e1b85e1689c855b99c994036ff6f1e9e21387caae31152b7db7e445b011cbfcc8505fd1fd", @generic="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", @typed={0x4, 0x6d}, @generic="94404b4593be7e27b7e3f7594ab98bc72362e04fa4dd2726252c7a31ce439c87d4930e1e9473e55bcb1c25781c6c141c9a88741ca458fcdc5198e513cc5406dc353af1c7fa3c0d7ffd943412f96f5f51099973e8e2afc8c231713349673d1d512a9271f966228d7f782a4573846e5b42bce48673b91387fa07b1502b708f844e5e4b4e557249c8311e41012e5052c53195f157cc542252", @typed={0xc, 0x5e, 0x0, 0x0, @u64=0x200000000}]}, @generic]}, 0x54c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000140)={'lo\x00'}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000300)="3f164d599344b798e787a7c79ffe6082638fa089b5b347168bc5c44ae18166d6acbbd21d62a049e9fe1be9385e02e4edc4cfac", 0x33, r4}, 0x68) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) mount$9p_rdma(&(0x7f0000000100), &(0x7f0000000180)='./file2\x00', &(0x7f00000001c0), 0x2100000, &(0x7f0000000280)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@rq={'rq', 0x3d, 0xffff}}]}}) 07:13:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x5, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:13:42 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x5000000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:13:42 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x111, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x2000000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:13:42 executing program 1: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"861c584ec53168a7f4563103f62ed4b7", 0x0, 0x0, {0x10001}, {0x0, 0x10001}, 0x730, [0x1, 0x5, 0xf021, 0x7fff, 0x1, 0x2, 0x1ff, 0x91d7783, 0x8000, 0xffff, 0x9, 0x7fff, 0x1, 0x8001, 0x1, 0xab4b]}) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) pread64(r0, &(0x7f0000000600)=""/9, 0x9, 0xff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x19cc, &(0x7f0000000740)={0x0, 0xdba2, 0x0, 0x1, 0x105}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000007c0), &(0x7f0000000800)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) ioctl$AUTOFS_IOC_CATATONIC(r4, 0x9362, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="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"], 0x64}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r5) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000003c0), r7) sendmsg$NLBL_CIPSOV4_C_ADD(r5, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000780)=ANY=[@ANYBLOB='Y\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01000000000000000000010000000800020001000000040004800800010000000000100008800200ed7f0800060000000000"], 0x38}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f0000000940)=ANY=[@ANYBLOB="d0010000", @ANYRES16=r6, @ANYBLOB="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"], 0x1d0}, 0x1, 0x0, 0x0, 0x44001}, 0x20044000) 07:13:42 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x6000000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:13:42 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x13d, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:42 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x105, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:42 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x7000000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:13:42 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="c400906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1803.684558] device lo entered promiscuous mode 07:13:42 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:42 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x106, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:42 executing program 5: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(r0, &(0x7f0000000180)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1803.705836] FAT-fs (loop4): invalid media value (0xcf) [ 1803.705851] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1803.718869] FAT-fs (loop5): Unrecognized mount option "vfat" or missing value [ 1803.968162] FAT-fs (loop5): Unrecognized mount option "vfat" or missing value [ 1804.065408] FAT-fs (loop4): Unrecognized mount option "Ä" or missing value [ 1804.225947] handle_bad_sector: 2 callbacks suppressed [ 1804.225964] attempt to access beyond end of device [ 1804.225964] loop5: rw=2049, want=148, limit=14 [ 1804.226266] attempt to access beyond end of device [ 1804.226266] loop5: rw=34817, want=24, limit=14 [ 1804.238705] attempt to access beyond end of device [ 1804.238705] loop5: rw=0, want=21, limit=14 [ 1804.245658] FAT-fs (loop4): Unrecognized mount option "Ä" or missing value [ 1804.247088] attempt to access beyond end of device [ 1804.247088] loop5: rw=0, want=21, limit=14 07:13:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) msgrcv(r0, &(0x7f0000000100)={0x0, ""/33}, 0x29, 0x3, 0x1000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) clone3(&(0x7f0000000340)={0x104140000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x25}, &(0x7f0000000140)=""/228, 0x82, &(0x7f0000000240)=""/2, &(0x7f0000000300)=[r1, r2], 0x2}, 0xaf) 07:13:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x6, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:13:55 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x107, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:55 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400ee07010004700004c800011cd70205f53ee3792996ca568e47e9cc01df3985e7a121", 0x2e, 0xfffffffffffffffc}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="06000000800000002e2f66696c653100"]) r3 = openat(r2, &(0x7f0000000080)='./file1\x00', 0x105142, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:13:55 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x2, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:55 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 07:13:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x4, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:13:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x9000000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:13:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xf000000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:13:55 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000040), 0x880, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) sendfile(r1, r2, &(0x7f0000000080)=0xf1c5, 0x3) ioctl$DVD_AUTH(r0, 0x5390, &(0x7f0000000000)=@hsc={0x1, 0x0, "000000002858f500"}) 07:13:55 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x3, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:55 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x108, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:55 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x4, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:13:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x6a9e8c87, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:13:56 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0xe1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup2(r0, 0xffffffffffffffff) write(r0, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r2 = fsmount(r1, 0x0, 0x80) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) syz_io_uring_setup(0x285, &(0x7f0000000080)={0x0, 0x764d, 0x1, 0x0, 0x5a, 0x0, r1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r5, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x65) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$bt_hci(r5, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYRES16], 0x6) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3, {r0}}, './file0\x00'}) mknodat$null(r6, &(0x7f0000000380)='./file0\x00', 0xc000, 0x103) syz_io_uring_submit(r4, 0x0, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, r5, &(0x7f0000000180)=0x80, &(0x7f00000001c0)=@phonet, 0x0, 0x80000}, 0x1ff) preadv(0xffffffffffffffff, &(0x7f0000002940)=[{&(0x7f0000002700)=""/254, 0xfe}], 0x1, 0x0, 0x0) close_range(r2, r3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) unshare(0x48020200) 07:13:56 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) mount$9p_rdma(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x804, &(0x7f0000000280)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@rq={'rq', 0x3d, 0x3}}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0xa}}, {@subj_user={'subj_user', 0x3d, 'vfat\x00'}}]}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1817.430772] FAT-fs (loop4): bogus number of reserved sectors [ 1817.430782] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1817.536269] attempt to access beyond end of device [ 1817.536269] loop5: rw=2049, want=148, limit=14 [ 1817.543808] device lo left promiscuous mode [ 1817.548641] attempt to access beyond end of device [ 1817.548641] loop5: rw=34817, want=24, limit=14 [ 1817.551267] attempt to access beyond end of device [ 1817.551267] loop5: rw=0, want=21, limit=14 [ 1817.560348] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 1817.566156] attempt to access beyond end of device [ 1817.566156] loop5: rw=34817, want=148, limit=14 [ 1817.569994] attempt to access beyond end of device [ 1817.569994] loop5: rw=34817, want=24, limit=14 [ 1817.570211] attempt to access beyond end of device [ 1817.570211] loop5: rw=0, want=21, limit=14 [ 1817.660620] FAT-fs (loop4): bogus number of reserved sectors [ 1817.660630] FAT-fs (loop4): Can't find a valid FAT filesystem 07:13:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x80040000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1817.782668] 9pnet: Could not find request transport: rdma [ 1817.798366] attempt to access beyond end of device [ 1817.798366] loop5: rw=2049, want=148, limit=14 [ 1817.801953] attempt to access beyond end of device [ 1817.801953] loop5: rw=34817, want=24, limit=14 [ 1817.803048] attempt to access beyond end of device [ 1817.803048] loop5: rw=0, want=21, limit=14 [ 1817.812095] 9pnet: Could not find request transport: rdma [ 1817.817988] attempt to access beyond end of device [ 1817.817988] loop5: rw=34817, want=148, limit=14 07:14:08 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x8, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001e40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001d40)=[{{&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)=""/145, 0x91}, {&(0x7f00000002c0)=""/87, 0x57}, {&(0x7f0000000340)=""/111, 0x6f}, {&(0x7f00000003c0)=""/235, 0xeb}], 0x1, &(0x7f0000000180)=""/16, 0x10}, 0x7}, {{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000580)}, {&(0x7f00000005c0)=""/160, 0xa0}], 0x2, &(0x7f0000000700)=""/53, 0x35}, 0x2}, {{&(0x7f0000000740)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000880)=[{&(0x7f00000007c0)=""/19, 0x13}, {&(0x7f0000000800)=""/108, 0x6c}], 0x2, &(0x7f00000008c0)=""/217, 0xd9}, 0x3}, {{&(0x7f0000001f00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000a40)=""/3, 0x3}, {&(0x7f0000000a80)=""/131, 0x83}, {&(0x7f0000000b40)=""/155, 0x9b}, {&(0x7f0000000c00)=""/65, 0x41}, {&(0x7f0000000c80)=""/4096, 0x1000}], 0x5, &(0x7f0000001d00)=""/57, 0x39}, 0x81}], 0x4, 0x40000040, &(0x7f0000001e80)={r1, r2+60000000}) connect$inet6(r3, &(0x7f0000001ec0)={0xa, 0x4e22, 0xfff, @local, 0x400}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000140), 0x4) 07:14:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x7, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:14:08 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x878c9e6a, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:08 executing program 5: chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) acct(&(0x7f00000000c0)='./file2\x00') copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@mcast1}, 0x14) fchmod(r4, 0xa0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r5, 0xa0) pipe(&(0x7f0000000140)) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r6, 0xa0) openat(r6, &(0x7f0000000100)='./file2\x00', 0x404a00, 0x21) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:14:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x5, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:14:08 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x109, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:08 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) getsockname$unix(r0, &(0x7f0000000180), &(0x7f0000000100)=0x6e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000d80)='./file1\x00', &(0x7f0000000dc0), &(0x7f0000000e00), 0x2, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file1\x00', 0x1c90000, 0x1, &(0x7f0000000480)=[{&(0x7f00000003c0)="8107caa1b9ff96e9d4c56c481ad1836b815e070b5693dbde9142fad470d4d52e1638068d14df6ca7f4275e63906231c3c60599aa52047e45a77c2d733aeeeb7bf2332b8a891b4cd32ae8196ade5857a307d97cf50fe1dcb263f7692aff6335133956f9c3991345cdd0f552345672404ab24ea9626e0710344ed847c9b9b6d346c3153a02620928fb755dae7f77f1d92fe398ff0c90552f4c91bd1e16af1e973c", 0xa0, 0xa}], 0x210000, &(0x7f00000004c0)={[{@utf8}, {@block={'block', 0x3d, 0xa00}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@nojoliet}], [{@fsmagic={'fsmagic', 0x3d, 0x81}}, {@obj_user={'obj_user', 0x3d, 'vfat\x00'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x5c, 0x62, 0x64, 0x62, 0x61, 0x63, 0x36, 0x64], 0x2d, [0x65, 0x38, 0x34, 0x37], 0x2d, [0x38, 0x32, 0x38, 0x66], 0x2d, [0x64, 0x61, 0x65, 0x61], 0x2d, [0x3ec5af7a90df87bc, 0x32, 0x38, 0x30, 0x39, 0x61, 0x62, 0x61]}}}]}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000e40)={{0x1, 0x1, 0x18, r1, {0x2}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000e80)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) name_to_handle_at(r3, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=@reiserfs_5={0x14, 0x5, {0x6, 0x0, 0x1, 0xfffeffff, 0x8}}, &(0x7f0000000300), 0x1400) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f00000005c0)='./file1\x00', 0x0, 0x9, &(0x7f0000000c80)=[{&(0x7f0000000600)="28ea19767fa9af01956743815b33c284eca2d708534a783a8283bbafa770942a0e37feb5dcfd5fe3b148c6f8a8f12b7e86f0e60d7565286858345c0f1416f945e9edcaf43fcc50c3f8f8009cf1d831b99a20c2cb443a97bb67be5d90c4782a93", 0x60, 0x8}, {&(0x7f0000000680)="b259f6c019441fbd33beb8416a4724f5c4d6615470245f501e35ac74b267fb57956267d41e84364f3b1523d7f257ad6ea94f21f6df3154f9c12a2d1032e0ad17", 0x40, 0x5f2}, {&(0x7f00000006c0)="c2c8336ce7de27fcc18de80eb2e4a8e81aab5fa5938b728c3aff7090", 0x1c, 0x4}, {&(0x7f0000000700)="fc714682c849d049ebeb81565ca36010b5ce47bf3cd990c82db28255db44772d3ddc01811430726690e984797556560119ce1e3cf845a6e3399318868f3e22200393891ca98a8fa1e4ec96f447b2a770b3a64ff7802900e923e15e80a6006a293f6618abb7db31df62864a83228eca63028447051bbc2cc53a13792f582343c4b7d9e09690c9ed53d0474a71044c6f6b2eb241a8efb596a4597d2ffed9c89fa5fc565268aece536f99bb119762a2514177d7792511671f7286d47ee75ae10275024bbacaae5e375f131b3aea02168d4bc5", 0xd1, 0xffffffff}, {&(0x7f0000000800)="e0267ce9e4b42be7368edb417b8b7a74a90915024d2a0802c1f642b102eac76757a630673870b83e9e7bb89179ca0a19db87d9a22c718dd9cbe1e1d9d22d4904506823e7871e2508708c5dbd145941cf51f7da8b441765438aa43f9c5daacd23d7efbabe1ec323b80e2cf7c953709f6bae5106f4bc851a7dbd9358237b573d9d0ea95d75abc5c9a1b70f12b902a6295b1c22ef0a9c8e2b2a917458b123009258911f7b1c9b41ed649efa6904214f09eb74a1197299c26e66db76fed34b498693cb3614db55c2b6a7edc42bab653d15eea83d36d77e7ca3", 0xd7, 0x8}, {&(0x7f0000000900)="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", 0xfb, 0xff}, {&(0x7f0000000a00)="3ea000bee2bb07f2dfe1542982ab475d2652acb24aeea55b8f8632b24703b0728b18ea8d1b23e99e7cb102cc6f82b6d8217b300f84c805ce7768402827435644ad4e8ddf2f50d5485ed80af47bbccf", 0x4f, 0x5}, {&(0x7f0000000a80)="23d8ff7709a8fbc8ffe06f551a1beb26db825f1aedc3193b45570638fc5aa8780fc259e773e6db626842647ae7464f01cb8533911954c902f11c7007cdc7b3c03aac3867b64bd3b459fc2742d6d603f62ae32ddfc144fc45a0b5f6e9ae5293c141e160af56b66b94281752d4dcac69049dbfb1fdfcc300aaa38a83ac7d9d1df5d0ea410174e5d8c2068cc59496416d1e399860938087c6917478f79cc1ad1a148adba87be4b3cd44c6e589948115aa2015b027f0d2bfe43c965e59db2f2be8733060a303e2e78213", 0xc8, 0x80000000}, {&(0x7f0000000b80)="0f5fb1d53c9dbba5c9e424db58f3f699e772c7fb895f3bb8cbb4763ee6b7718c307adca65517d0818c1b2cca303b695586bd25d36bb9b6555853bad93f84ac9b7d4677ac92291430d40645975d6efada9f325a422508ee10501ce80b82b78739e15d2791873e454718294752e5b3e99050208e51c48c716bb373dd9b1cc57b589243598e00635941aca140e242e7d7f70e70dddec39f52364c668a6dcd4e17dc44b919b3d8f8310fbf4b6d3ca7e913f6b24d8b5155ab06185e2d425d7de0887c35b7c66dd198a38210f2e359edf097b99f8f9a76eaa0a2e531b5bd56b70e1b9a680415e32772c1af14", 0xe9, 0x2}], 0x3000000, &(0x7f0000000ec0)=ANY=[@ANYBLOB='nnonumtail=1,shortname=winnt,shortname=winnt,uid>', @ANYRESDEC=0xee01, @ANYBLOB="2c66736d616769633d3078303030303030303030303030303030382c61756469742c686173682c736d61636b66736861743d6e6f6a6f6c6965742c736d61636b66736861743d2d2e297d5d2c00df7a5c0f65c6c9851fc02d1ceaadec435b3468124e561601137caaff6d242e29072a047929f396d987bbedf1d2b280589957503527b2a7bfc7bd56b14a9d50b9ca958af566b62782368832ee282b83cc805c7b76c60cc207e5e853580a4c0189c9623ab001bc5bce68c25a57285da1f7fe8463e41546000000000000"]) truncate(&(0x7f0000003200)='./file1\x00', 0x6) 07:14:08 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xa, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:08 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x8cffffff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:09 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x10a, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1830.511658] attempt to access beyond end of device [ 1830.511658] loop4: rw=2049, want=148, limit=14 [ 1830.534268] attempt to access beyond end of device [ 1830.534268] loop4: rw=34817, want=24, limit=14 [ 1830.543381] attempt to access beyond end of device [ 1830.543381] loop4: rw=0, want=21, limit=14 [ 1830.577172] attempt to access beyond end of device [ 1830.577172] loop4: rw=34817, want=148, limit=14 [ 1830.590457] attempt to access beyond end of device [ 1830.590457] loop4: rw=34817, want=24, limit=14 [ 1830.596514] attempt to access beyond end of device [ 1830.596514] loop4: rw=0, want=21, limit=14 07:14:09 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) fchmod(0xffffffffffffffff, 0xa0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) r2 = clone3(&(0x7f00000028c0)={0x223000280, &(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780), {0x2a}, &(0x7f00000017c0)=""/143, 0x8f, &(0x7f0000001880)=""/4096, &(0x7f0000002880)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) getresuid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)=0x0) getresgid(&(0x7f0000002a00), &(0x7f0000002a40)=0x0, &(0x7f0000002a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ac0)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000002bc0)=0xe8) r6 = getgid() ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f0000000180)={0xe54c, 0x50, '\x00', 0x0, &(0x7f0000002d00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)="4c3f73ea06229ab5f8d4fdbf339d14eb24671b7c", 0x14}, {&(0x7f0000000280)="e162455e6debe4e7315daf5377f2b4e6ad748a10943d9bb7eabd053915cf9c9f236546d304711637d605fcfd9555dfd0bb7e3380facdbdeca757c1eba84ed1", 0x3f}, {&(0x7f00000002c0)="f1da63f8332416299df84eb7338e2379027df0e1a616b5545bd01d76712e02e131d7d5d11053db1c32326901264b06f288b0fcc63bb44f1b144de0cb30a0d81b3ec0a55697ceb82a7ae43df414bfe24539f8940dd534b9a5c52c96c544822fc02d51ecb388f092f966b6de3d9536a578b670c1908f2f9a3fee132833cbf919e17c0570fdb9fa967e3b4ef8684e3c7b496e44215b6a6657b8977c86777c1e9399b588d2d701580b46c5df2d559c41b5452c9009dab42960252582ffccbba0b844ad8190f69db734e4be3a5daa54abd5f5def865a1ffac19a02ae8b510bda5b7ccb632bfd4677d617e405bf4ef666155bd7da8a8", 0xf3}, {&(0x7f00000003c0)="a3b90eeea5f4466f24a7edf7a05e693b0cf459b2c6c4ec1688d3705f6c9ee0ccb7bb3981fc9a19c49cf56d21e2d80439378591e687cf6dec72fbc1f8b6167bec16e815b1394801955a2874b81d7047a2329f60266c215b111e2486e428d9a90e2dfc39b8d1a4b2e8c00eab077a7fb31a650273aa8c60ccc502f22d52ce94ff5967daf00a7ae789be802803c84dc24bbf8399d90b2c330eb9a44185ff9c0f874135231b592b55d5aa006fa1ce429d75e4716792a53960584b2a69912702163605dcaaf6a33f", 0xc5}, {&(0x7f00000004c0)="0943859d205f05ab73e0d9588a9b22eb8f420395645f00b3a5ba5bd837c3e68dfe37e0488e3d2c8182dd51d8cdc2c15be188d79581756c16117b5c980e5d8e2baf6f3b28dadeb5bb12e22cf8f4c88efb68f9a5ad2a3e735560740fd63afe03ce78cd31de4b50861229670fb074b081c6392606025f7d90eff6", 0x79}, {&(0x7f0000000540)="b6246f9151b9cfc66acd4d51f113e5ab071918bd138ea86e85da5ceff9f38b09743ee06c0510ffe9dd5bfec038cbf588700532d561c28c9be92196686ec0d39121fd8ecea734c90323dee7da75990d590ba1328fb108d8ff8e89779bdb98e6bad65cd3e6d5e2022a5533de3f6caf07584e4014b8f03a6735db17d22e893694296a7de2880c57ba7eda8b06c8fe4260d4e0d5c2ccf2c0b3462eaf8ea0ea61f3018b55953bcd0b48", 0xa7}, {&(0x7f0000000600)="599732e0095441860061d76c7c01a4f9a3833a1959d84f4ae155f49610", 0x1d}, {&(0x7f0000000640)="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", 0x1000}], 0x9, &(0x7f0000002c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r1, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0xa0, 0x40}}], 0x1, 0x40004) chdir(&(0x7f0000000040)='./file0\x00') open$dir(&(0x7f0000000100)='./file1\x00', 0x20200, 0x21) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r8, 0x0, r7, 0x0, 0x4000000010000, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x128) copy_file_range(r10, 0x0, r9, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:14:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x9effffff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:09 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xf, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x6, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:14:09 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xf0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f0000000140)={0x0, 0x100}) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c010000100001000000000000000000fe8000000000000000000000000000bbfc00"/64, @ANYRES64=r0, @ANYRES32=0xee00, @ANYBLOB="e00000010000000000000000000000000000000033000000fe8000000000000000000300000000aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e2f64c8bc209dcb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00010000000000000000005c001400636d61632861657329"], 0x14c}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$nl_xfrm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=@getsa={0x8c, 0x12, 0x0, 0x70bd2a, 0x25dfdbfc, {@in=@multicast2, 0x4d6, 0xa, 0xff}, [@lifetime_val={0x24, 0x9, {0x0, 0x1, 0x100000001, 0xe861}}, @encap={0x1c, 0x4, {0x1, 0x4e20, 0x4e22, @in=@dev={0xac, 0x14, 0x14, 0x23}}}, @policy_type={0xa, 0x10, {0x1}}, @etimer_thresh={0x8, 0xc, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x4}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x401}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000100}, 0x3) 07:14:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x8, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:14:23 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(r0, &(0x7f00000001c0)='./file1\x00', 0x101000, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0xa1) copy_file_range(r2, 0x0, r1, 0x0, 0x400000000fffe, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x200800, 0x2b) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x145142, 0x30) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:14:23 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x217, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:23 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x10b, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1845.338067] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 07:14:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xeaffffff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x7, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:14:23 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x48000, 0x84) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) write$P9_RREADLINK(r0, &(0x7f0000000180)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) 07:14:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x149001, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x8) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$sock_ifreq(r5, 0x0, &(0x7f0000000240)={'veth0_to_batadv\x00', @ifru_mtu}) fchmod(r3, 0xa0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r0) sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r6, 0x400, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x527, 0x13}}}}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000800}, 0x8000) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2cf10900", @ANYRES16=r2, @ANYBLOB="0125925f495b77fabe6000000000000000006cb5fc3881c41439d45e9f0942833b192a9cc8e378235b51ba596f5157f2fc1a402d42c1aff2f2fd7150e22d", @ANYRES32=r1, @ANYBLOB="0800c400000000000800c30000000000"], 0x2c}}, 0x0) 07:14:23 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) write$binfmt_elf64(r4, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x1, 0x0, 0x2, 0x3bb, 0x0, 0x3e, 0x4, 0x369, 0x40, 0x310, 0x2, 0x6, 0x38, 0x2, 0x1, 0x7, 0xe544}, [{0x1, 0x100, 0x1000, 0x5, 0xec, 0xfff, 0x86f1, 0x1}, {0x7, 0x1ff, 0x2, 0x2, 0x0, 0x1, 0x3, 0x5f80000000000000}], "78c424a0c1b7d1d381b32867465cced72731e6b9cb95168136bef994af766927f232086f31922c2f84e09faa894c8ad8ff08a06c3badcb0db21be802639104", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xaef) 07:14:23 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x10c, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xf0ffffff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:23 executing program 4: setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000180)={r1, 0x2, 0xfffffffffffffff7, 0xff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x446401, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x80000, 0x11) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x111000, 0x104) r5 = pidfd_getfd(r3, r3, 0x0) copy_file_range(r4, 0x0, r5, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) unlinkat(r4, &(0x7f0000000100)='./file1\x00', 0x200) 07:14:24 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x10d, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1845.367549] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1845.421930] attempt to access beyond end of device [ 1845.421930] loop4: rw=2049, want=148, limit=14 [ 1845.425562] attempt to access beyond end of device [ 1845.425562] loop4: rw=34817, want=24, limit=14 [ 1845.428295] attempt to access beyond end of device [ 1845.428295] loop4: rw=0, want=21, limit=14 [ 1845.442766] attempt to access beyond end of device [ 1845.442766] loop4: rw=34817, want=148, limit=14 [ 1845.446640] attempt to access beyond end of device [ 1845.446640] loop4: rw=0, want=21, limit=14 [ 1845.650240] attempt to access beyond end of device [ 1845.650240] loop5: rw=2049, want=148, limit=14 [ 1845.663901] attempt to access beyond end of device [ 1845.663901] loop5: rw=34817, want=24, limit=14 [ 1845.668298] attempt to access beyond end of device [ 1845.668298] loop5: rw=0, want=21, limit=14 [ 1845.687219] attempt to access beyond end of device [ 1845.687219] loop5: rw=34817, want=148, limit=14 [ 1845.702150] attempt to access beyond end of device [ 1845.702150] loop5: rw=0, want=21, limit=14 07:14:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xfffff000, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:36 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) fchmod(r5, 0x4) sendfile(r4, r2, &(0x7f0000000180)=0x7, 0x8) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000100), 0x4) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) setsockopt$inet6_IPV6_PKTINFO(r7, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000006d00)={0x0, @xdp={0x2c, 0xa, 0x0, 0x37}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x34}}, 0x2, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006cc0)='bridge_slave_0\x00', 0x8, 0x100, 0x8001}) sendmmsg$inet6(r1, &(0x7f0000008740)=[{{&(0x7f00000001c0)={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, '\x00', 0x43}, 0x87e5}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000280)="f65233c4ac43f8edf4746eea5bcac50d61d70ac38e164a91b9a087141998e5465b4e53fde9cda150b43245781dad4fea6ddb4859931da3d01483a5c7d9244b7c0271b21708a8d010d9c7c2111f5383ca2da72e6b1eeb46aaaa92a01b8b13694e83432b46e6eb3f55cdc916a0de5a6ca9aaf09a7c89aa69fdde1f89d1dcfa61ff796f1dbb782455541f23762409f59d13dc25de2f718edda813e3451a982de2f05a4b5cf69e008d38ce336d079e36605c5f727fb3883cfe6ca2727f760042e2a7d0eccfa51c40", 0xc6}, {&(0x7f0000000380)="1a3102daa1763fe2b41e8747400935ec1d43500a7b3a99cd20dad7e8e7b99af90afcd2d1326e48bf27577e54a97cf98fec310306689e5e07ce3603be68a8a57feb1d2f", 0x43}, {&(0x7f0000000400)="bb7c2e5701cec826be5eec5f0e4dabb7eeadb6069721d709d6583908875b03b4fc641dbdbf92", 0x26}, {&(0x7f0000000440)="52060e096aa6816aca454fbf7ba2482080fca19acaef207ac7637088878d7dd0e3e67a5159ef10a19ec5f71f486d59100c88ee0fc958ff57a4941df8414562", 0x3f}, {&(0x7f0000000480)="1f095d0080902d06cf0392f710fce8b3b12d07e2c47c3f5b2770428b7368c05966b2187c5831acbd8bd6e0f60071b9d61a2e2d3c82aa78781625b1afcd523e7ebf4fd6ca2d7acf85d895b869446940d5a2e1fa94b46c65457da5b8986a39301b766f23ebb5d7563da603301a005f648340dc7ee5747efe87712f407bbec7afe76b94733fdf96765a51f1f59cc0306e5a392097cd185cc2ae", 0x98}, {&(0x7f0000000540)="13595c87337242c8d03ccea943d60ac29fa29669cdf5dcd259b054b62ab85ebbed405b288c3b4420db1c20c998c05c4a2e384bc258f3ddcc749600541ec65db35192a1167af13d9ff8b617ccfb271ccb7f7a714552d1d61b1ffc7179a888853693ff13b0949c07a8af9f5aa5f79207c5e29616139f103db6acebed6c765f632136c7257f8e7a8b51525e", 0x8a}], 0x6, &(0x7f0000000680)=[@rthdrdstopts={{0x30, 0x29, 0x37, {0x6, 0x2, '\x00', [@ra={0x5, 0x2, 0x4}, @hao={0xc9, 0x10, @private1}]}}}, @tclass={{0x14, 0x29, 0x43, 0x3}}, @hoplimit={{0x14, 0x29, 0x34, 0x400}}, @dontfrag={{0x14, 0x29, 0x3e, 0x200}}, @rthdr={{0xb8, 0x29, 0x39, {0x73, 0x14, 0x0, 0x0, 0x0, [@private2, @private0, @private0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast2}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, @remote, @empty]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x3}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r6}}}, @rthdr={{0x88, 0x29, 0x39, {0x67, 0xe, 0x2, 0x0, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @private0, @empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1, @ipv4={'\x00', '\xff\xff', @remote}, @private2={0xfc, 0x2, '\x00', 0x1}]}}}], 0x1f8}}, {{&(0x7f0000000880)={0xa, 0x4e23, 0x1, @private1, 0x4}, 0x1c, &(0x7f0000001980)=[{&(0x7f00000008c0)="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", 0x1000}, {&(0x7f00000018c0)="25c6ef2531f7d8e9acb222cc3a5c1ac1a4dd7b6deb6dadc148d9943cb8e79a4a6aed8b7cec74b2b0221d365c8dfe2bba6eaa773ffa53fbec324514762b16cb21c9ed0f337fce45defa8d33e68c2fd6db1fd5bd4b385e8151a91b59dcbcba9fc69d202311ee4b89a1cbcc8f0e53f1f36a23b19c97b5ddbc0a889b5c419a03b2255865477baf0eb3760d7c40ba", 0x8c}], 0x2, &(0x7f00000019c0)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x3c}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x6, 0x6, 0x0, 0x40, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @private2, @empty]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x6}}, @tclass={{0x14, 0x29, 0x43, 0x200}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8001}}], 0xa8}}, {{&(0x7f0000001a80)={0xa, 0x4e23, 0xdd, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, 0x1c, &(0x7f0000002b40)=[{&(0x7f0000001ac0)="f4f5e3ae1ad9daa86958c867a0fc71e3c1b109e5da73c81e98a9925a5ac1f098b1fadff29ac6676c0e9a6456145cf0d14ed6356f6f02e17a4ccdeaa86a45b3e6fa9ad9f66843e1724a0c2d091272ecdacab907c317818c3cf74809d739a7170fffaf30205504976748917cfcab080e8810986d0f020bc128f9e7cdc3", 0x7c}, {&(0x7f0000001b40)="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", 0x1000}], 0x2, &(0x7f0000003240)=[@pktinfo={{0x24, 0x29, 0x32, {@private2}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x20}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x5}}, @rthdr={{0x68, 0x29, 0x39, {0x33, 0xa, 0x0, 0x0, 0x0, [@dev={0xfe, 0x80, '\x00', 0x35}, @empty, @dev={0xfe, 0x80, '\x00', 0x16}, @empty, @loopback]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xa3c}}, @hopopts_2292={{0x10e8, 0x29, 0x36, {0x5c, 0x21a, '\x00', [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x7, 0xa, "f570911ded5294ca1c2f"}, @generic={0x0, 0x56, "7699f097b2ceba55cf72bbde08baebe568a3f067435f2355675b881227d5eb21b275d640bbfffdef0fa84ca7297602b177908ed0cd2b75699eb3fec4814ed84d0aea08e2cc2df1da1374bb667f5ea0029b940feaba04"}, @hao={0xc9, 0x10, @remote}, @padn={0x1, 0x1, [0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x2e}}, @calipso={0x7, 0x38, {0x3, 0x1c, 0xb6, 0x0, [0x1, 0x7fff, 0x2, 0x1a1, 0x40, 0x7]}}, @generic={0x2, 0x1000, "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"}]}}}], 0x11d8}}, {{&(0x7f0000002b80)={0xa, 0x4e21, 0x9, @local, 0x7ff}, 0x1c, &(0x7f0000003100)=[{&(0x7f0000002bc0)}, {&(0x7f0000002c00)="118131573992dd1af25d0e43d2d40249f89eb4d38cefe5913143853901e9ab7fdbced5baada9f4b9a1e8c18a4f3d98105aa62977e36dd9ecc0db73c06966ed02905441cd627541329320e69778cb033dd205e1aaa3f06af8298e0d5242a2ca43c9ed0fc10a0332dba901eca9c76f0cec3ec51aa5872dacf3bd8e80cefffe3de1841413ee81203a14c0907f928d051e0416c532a7911927e3fe4d7da114d9fe3826073b0368de6285e6820d0f620448570755fe722bae9b2777cf9e356c8dcca3f40cfcfaff39050816eb1f905976c344000631f00618bb9e5a482fb2623724b68adedcb8189b0202fc1508f5cc1e", 0xee}, {&(0x7f0000002d00)="c4dd59acd41d9ec11136bbbf802640e542faeef41a7685fd212aff42a287466d14d1a9a558c34f4d9cc33a20525fd07edeadb04778c8e82108bb5dcf38b1a1376e454ffe7fbc493965d39716eea4de0d762134152d06a84c039b6f0d9039c8df26", 0x61}, {&(0x7f0000002d80)="0f6cf09e7342c0bb393a6793cfea600e6e3b7e93990a1eecafa1e0e4e1dc03ae2a2a5a7421d1d3569c4e009d6b5ce498f2b0697ea553a21a17e5123094f7b506a07c3218d0a4a55fbec3fe9dbee0c29cdb2c43398293adf1d0e7dc81e0a2d41cdccc808c0bf83d0ac4821d550228eeefe76602f591b6125bb0786bfcf6a9a0c5feaae773a59d37c106d877b52bc49786e5ecd6ce9e1e16a6d2d19f41c68aac63df9a64959dc68c0800578c83d815362479cc", 0xb2}, {&(0x7f0000004440)="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", 0x1000}, {&(0x7f0000002e40)="1b13f44b57885fe31195197b7246e2e2a98f03e27841f216bd49269cc6e6681df492b339dfe2d2d57f504994f8a109c4c8d52a571974f9642d50b325f452ec7666cf836bdf7a95ad6999bc0e14d3c3b469d8edab6c46983daaae4d4f42218c41ebe983dd6f01dc18ce2bc0a5dcd0bf98119bf84129c343612888dcec9866", 0x7e}, {&(0x7f0000002ec0)="d78dce1d10305eb7f0aeb77756a41eb2edb9a6c5f81a527466d889299f937fea5beb3ccfdac32a23f054146131e7f6e9552a6a3f45ea9185aeaa467b822aafe3094ce651b064bacbb93758b91463ea921f13d7a7104f3799f2bbc1bff06d12068393a9f16a7ac01414e8472063eb86cc375b", 0x72}, {&(0x7f0000002f40)="a00085fc7a88ee8c6f667383715e999fdbff3a4a0109ae7d", 0x18}, {&(0x7f0000002f80)="b03a058aa417221d539b43c228ac21c70aa60175bfe98d6400162954e1d408bef3710a90e38974915e1e964f79337c7c03df1b6ea77872a6abd052772c25d520905d591e943bb4ce9ae957870f3fa24512c6ca0c31bf686eda590e1455fc21535a55bdb7f9453f34ff2084e9a6d1a78b8e8d", 0x72}, {&(0x7f0000003000)="2026f0d79847c80796e0a6369753a04de139b4c5552bb1d2aff0afee6b6b7d4f7db64ec448d8c35b1b984bc13dcfb0263853a5142e99616acfed09c2c06215b828459c61058852da5811639d1fd92661057c308b00cc34b690395dd5d8c40cf6390b809614a15c96b8960110d9b41f6c9df48efb5c58ee93e8c14ab3ebe32d4b05c33b1e58e13eeacd9c7a1f9a73942ca73e915fb642a940220b7d8155502fcd297de721f31f4161d4ce33072e0033ab7458bc2663a111ba9fdcb04e764f9ef86e6129a5060faf09914ed7817da1011cac2a1941104e8d1dab40e914dcb5e27d784c49e7155c9d6af1e93249f5", 0xed}], 0xa}}, {{&(0x7f00000031c0)={0xa, 0x4e21, 0x6, @private0}, 0x1c, &(0x7f00000055c0)=[{&(0x7f0000005440)="b6e5a679a3514d77a3fd8d9ab57efdaf29a176ce35fa4bd370d46afe748719c99c99d7b1158d27659c138bf94f9d0781cf9facd18c3f077f66ba0a692102e0890104ea26581a50ce794d9eef220dcbe9f06c3ce956bfbd6cdf427722d9d54327177c9dbc2748ad72591f3d41ef15a2f2ed4da98ee296c0e5e20fbd8a", 0x7c}, {&(0x7f00000054c0)="17751e2b2917dd8a72e665d4646999b0a6c705ec23f8e773f8c9b76f570c2ab42b9059fc617f04c26fa3e3b30faf74da51c6b01f6bad6b896ca46e8305fc406b140c6dff673ef8f45ea32ef49c1f7004d249df1740dc1ce7751b4abfcbfbf91df1231a6759faa0969fe42ad884498cb8f3d84a6afdf68cac7dc9becb01ca8431e42611251729ff6123ae14e392596fe69d5cd1544ef115f8f947f575b9bf8a9e8d0c83bf0b09eac8e5bdc85b793e17cc2b8f67a609717efb02bfab28e0f671f062d68c57a616cb73079feaa3b03bc98e6e", 0xd1}], 0x2, &(0x7f0000005600)=[@dontfrag={{0x14, 0x29, 0x3e, 0x9}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x0, 0x6, 0x2, 0x4f, 0x0, [@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00']}}}, @rthdrdstopts={{0x90, 0x29, 0x37, {0x0, 0xe, '\x00', [@calipso={0x7, 0x20, {0x2, 0x6, 0xff, 0x1, [0xfff, 0x1, 0x7]}}, @pad1, @jumbo={0xc2, 0x4, 0x7}, @enc_lim={0x4, 0x1, 0x5e}]}}}], 0xf0}}, {{&(0x7f0000005700)={0xa, 0x4e21, 0x55, @mcast2, 0x2}, 0x1c, &(0x7f0000006b00)=[{&(0x7f0000005740)="827787b793036c395818bfc022d87d16724e48d3e16acf85a1a735805b75b01d868b280629bec4ed23a846681bfdd271fa1b2f390a", 0x35}, {&(0x7f0000005780)="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", 0x1000}, {&(0x7f0000006780)="6f99e257686dbb01631ef16690b1d9ff196edc6dfa7f75af1cc7d63dd0f502d0d5d7e8d2ae29765c80fa0d903e50277dc4bb03a667be7d653b0e90617344f1f62d179cc118a45b209dcf262c24583218051a8135faad4774a3", 0x59}, {&(0x7f0000006800)="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", 0xfb}, {&(0x7f0000006900)="becbe24c5df255ab920143226a1595e781162fe81ba56b7ff06d55a4d4a7f88a10680b01aecd3d15eba0883f92f28c50e9a2bb1ede640275ffc802fdf1a2d1ed123f817fd5df9da8ec16132b306cc74712ea448e76eb1047362348cac334cc9d0abffeb3f56940ae5f726ccb63987ad5e5d8a38bf09edab928ef4061786fa03a0cdac0243779feeee1d6d03f1f9568aeb82601a99031f80a22f4978858779e4ebcb056835e96a37ae0c70b220072ad5e66455ecb462c06230638efe82a98b5382d26b5e210aeef", 0xc7}, {&(0x7f0000006a00)="7d5a2361ab9ec89262054bd616ca9784426abef06ebbdba4f69db73011b439a8b906beed3da1821589092f3a29fb5a2f95a3841fde66fbb8bc0dfec0364d494811896a7f5b982d4f7dbb4b766131188c81b9d187dd6c25510c32b8f17c54519e96cb0155a1051b4eb8337f738940bb525f05a4ce011cb15de6ac150c7b9f37176d5e1e8f71f7193698b397dbf91fdee6c45aa0d3650a43c2aaee7b5b45d2e8cf67b38d05dd88272ea0c7f00737cf5d47780ed59b678b8b41b049ce18c14bfe49b36e0d79a545fad68cfc16dad5501b774ef679164fd7", 0xd6}], 0x6, &(0x7f0000006d80)=[@rthdr_2292={{0xb8, 0x29, 0x39, {0x62, 0x14, 0x1, 0x80, 0x0, [@mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, @dev={0xfe, 0x80, '\x00', 0x1b}, @private0={0xfc, 0x0, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @empty}, @private2={0xfc, 0x2, '\x00', 0x1}, @local, @private0={0xfc, 0x0, '\x00', 0x1}, @private0]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1, r8}}}, @tclass={{0x14, 0x29, 0x43, 0x9}}], 0xf8}}, {{&(0x7f0000006e80)={0xa, 0x4e24, 0x1, @empty, 0x1ff}, 0x1c, &(0x7f0000008380)=[{&(0x7f0000006ec0)="9fb4d4d1c494216aab6605b8d9308ad9ae418a3edacac1d73b79fff2d40418241f4315b5ccf39dce67d9aafddc4ef1433bf968c25ceb006f6e623112927d95a8676b14a00baec63e80a275bd15315e27158edddc9df69cc719d0a69a955f886f4630779f734444b081063ff696fc071a1cb6ed29652c08d6c450f3145087592b2c0676fc9fe311110a6bb385089bfad2fbd1cc428499fb1bfc38631a37a6040290b5eb067fe90c5abe870ac9aac900f880ce47a3568eeb08f65f838040b7ce6c081e9e18a2dbdab54ea1e0382da463b60f3b2bd5d7087591fc8bab3ca966afc21e6ed875ceeb2bd9037e9dad15f3759b2971c6d8815e663483", 0xf9}, {&(0x7f0000006fc0)="1e2fee3dd6d261a82b894252c84aa0246b6b22463f729da43878212648338d3358a12092117d9ed1b6e9a05c3fc60440a31ed331e56b415f693b011773add3818ad964cb188b15df10526416bf459a4a86a00c024615e8ddfd418d8f39787df252859ff052e1fcdc3adcb73fe033011fc21ca4125b0dbc09c5d20be34ea42268af603912a20843990a3f32bb4fb0e1c71ac7f6ba1dd77a9c6965c564ca172a6185980e0ecf1063a0ded8056c5a516ff65b7ae61074f739472097b6d96c8e6924c015f68008d3b61988cba89d33784d058d94cd0a4b807b176cc4778a8d30b3df7bcf8e8049a906bf1104c70b7200", 0xee}, {&(0x7f00000070c0)="72cd6953f5581efd09cb4ce7146b59af4c", 0x11}, {&(0x7f0000007100)="85b5cb590bfa2d8ab3997c7114d6dbc462f384b159fa780daf6b13ce31fe082075b2da1975d2a7b63724c163a8364daf34ed8457c2eb02488ff44ba032cca5bfa67f42a70e4ce07e2b334fd7edb5184ed9f343828fb5a474210717f17199abb61be7ad711fac39f53e305722dd5e4e32dc20d7a7fbb3f2b8e026d524da41c35671c389fd63a073bdf8a2feb6a0a3740c0aca9f850aafa01e", 0x98}, {&(0x7f00000071c0)="45af705d253177864b2fa345063fd54093e3bf249caced00967a9f1e3d00eb0556e3e92d41ec96ac8b644838e0ab840020c8301237f6fc1c4590a26ded268c9e8ce6c0fa10c27c1afb7dd682f541b5bb7b75a1895216ec8a580c20c343d51b71ed16755d1f3efbd708096489d4f2de1523af44", 0x73}, {&(0x7f0000007240)="290b5a4514f08c0e33d9333f80defa627b96608c0f4819eee799b731e70e434c4a89e38e07ce336173ce27136a54bc87aabc6f829bee80e53d0a3e16cdf516867f01a10d43d0b7ff1a517ec52a8beaaf811ecdc5e17eef1545728213b8d81e53c020259345f56d837289f8426f70cbd0add6c04758f2b8bd20c9f3f80b262e98d02dc4ff7a142091792cd81b6bbc0022eadbf2e9216ee5b9cc491351b2b7730e0e75c8d9bfdcbe843228c532d41206988927dc4db980523e20ae22faf6443afdf55b7f974897dc0214336059dbd21a7a90065c774cf21dceeea66582a0ddd18b", 0xe0}, {&(0x7f0000007340)="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", 0x1000}, {&(0x7f0000008340)="da2da139dd10173d434808aea4edd9c5b58a3125752950268206f0df6a50834e57fd38b65a319c5d0893457b", 0x2c}], 0x8, &(0x7f0000008400)=[@hopopts_2292={{0x50, 0x29, 0x36, {0x2e, 0x6, '\x00', [@pad1, @pad1, @ra={0x5, 0x2, 0x23}, @enc_lim={0x4, 0x1, 0xdc}, @hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @private1}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x5}}, @flowinfo={{0x14, 0x29, 0xb, 0x10001}}, @rthdrdstopts={{0x48, 0x29, 0x37, {0x2f, 0x5, '\x00', [@jumbo={0xc2, 0x4, 0x3}, @ra, @hao={0xc9, 0x10, @remote}, @pad1, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x6c, 0x0, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}, @rthdrdstopts={{0x50, 0x29, 0x37, {0x67, 0x6, '\x00', [@enc_lim={0x4, 0x1, 0x2}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x18, {0x0, 0x4, 0x80, 0x3, [0x7, 0x8]}}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}}}, @dstopts={{0x48, 0x29, 0x37, {0x2b, 0x6, '\x00', [@hao={0xc9, 0x10, @mcast1}, @jumbo, @hao={0xc9, 0x10, @loopback}, @pad1, @pad1]}}}, @dstopts_2292={{0xd0, 0x29, 0x4, {0x6, 0x16, '\x00', [@calipso={0x7, 0x40, {0x2, 0xe, 0x3, 0x7ff, [0x0, 0x7fff, 0x66d, 0x2, 0x0, 0x9, 0x7fffffff]}}, @pad1, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x21}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x1f, 0x3, [0x7, 0xffffffff, 0x7, 0x2]}}, @ra={0x5, 0x2, 0x6}, @hao={0xc9, 0x10, @remote}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}, @enc_lim={0x4, 0x1, 0x3}, @ra={0x5, 0x2, 0x9}]}}}], 0x250}}], 0x7, 0x40814) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1858.439572] handle_bad_sector: 2 callbacks suppressed [ 1858.439583] attempt to access beyond end of device [ 1858.439583] loop4: rw=2049, want=24, limit=14 07:14:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x8, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:14:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xa, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:14:36 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00'}) r4 = mq_open(&(0x7f0000000100)='/\x00', 0x40, 0x0, &(0x7f0000000180)={0x0, 0x80000000, 0xfffffffffffeffff, 0x1}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4, {0x9, 0x1}}, './file0\x00'}) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:14:36 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x10e, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x1, &(0x7f0000000180)={0x0, 0x2e3c, 0x20, 0x3}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_setup(0x1, &(0x7f0000000180), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f00000000c0)=@IORING_OP_WRITEV={0x2, 0x0, 0xf14afa268ba2300d, @fd_index=0x6, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="69bdad1b8b9e7b24fd350232126d854fe193671335a25233e1a7fd6a5409e8d1c0cc65ecbc48b2ec11b396ba325655dae14585c1fa97dff7e45092117c0d2411477662c2567e20160110f4de6e63393129ea02effe2330e4e28db7178f0ebfb612899f48413c78220dadc375e2527474664fc6e73256b3709315e30eb7d9c823d84dd14843760d11fc7ca0b2b4adef2429184b279876ed0bc129f5a0e6629e6ad01149f57ea67c4cf359de12decf94809c674b6895a7b1de0fb06c15b8569b3e32d47cb7ffc0c9f95b7cb566342a4be8b02dd44e6c885bf1668203aa0867efe521166359f29f76864ae2fc29", 0xec}], 0x1, 0x18, 0x0, {0x0, r5}}, 0x40) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd=r7, 0x0, 0x0, 0x0, 0x5}, 0x0) r8 = dup3(r0, r6, 0x0) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8914, &(0x7f0000000140)={'lo\x00'}) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r10, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) r12 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) setsockopt$inet6_IPV6_PKTINFO(r12, 0x29, 0x32, &(0x7f0000000040)={@private0, r11}, 0x14) ioctl$sock_SIOCDELRT(r9, 0x890c, &(0x7f0000000300)={0x0, @phonet={0x23, 0x0, 0x2, 0x3}, @nfc={0x27, 0x1, 0x0, 0x2}, @can={0x1d, r11}, 0x6, 0x0, 0x0, 0x0, 0xd18d, 0x0, 0x5, 0x9, 0xff}) io_uring_enter(r8, 0x1, 0x0, 0x0, 0x0, 0x0) 07:14:36 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x300, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xffffff7f, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:36 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xa00, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:36 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x10001}}, './file1\x00'}) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000180)='vfat\x00', &(0x7f00000001c0)='./file0\x00', r4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:14:36 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x10f, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1858.526374] attempt to access beyond end of device [ 1858.526374] loop4: rw=1, want=21, limit=14 [ 1858.547996] attempt to access beyond end of device [ 1858.547996] loop5: rw=2049, want=148, limit=14 07:14:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xffffff8c, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:37 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) copy_file_range(r4, &(0x7f0000000100)=0x100000001, r0, &(0x7f0000000180)=0xda, 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='.\x00', 0x3) [ 1858.557292] attempt to access beyond end of device [ 1858.557292] loop5: rw=34817, want=24, limit=14 [ 1858.558348] attempt to access beyond end of device [ 1858.558348] loop5: rw=0, want=21, limit=14 [ 1858.567971] attempt to access beyond end of device [ 1858.567971] loop5: rw=34817, want=148, limit=14 07:14:37 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x110, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:37 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xec0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1858.763897] attempt to access beyond end of device [ 1858.763897] loop5: rw=2049, want=148, limit=14 07:14:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xffffff9e, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xa, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:14:37 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xf00, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1858.818591] attempt to access beyond end of device [ 1858.818591] loop5: rw=34817, want=24, limit=14 07:14:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xb, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:14:37 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x111, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xffffffea, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:37 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x1702, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) socket$netlink(0x10, 0x3, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)=0x7) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000100)={0x0, 0x6, [0x0, 0x100000004, 0x10000, 0x400000000, 0x0, 0x8]}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) readahead(r1, 0x4, 0x20) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat(r0, &(0x7f0000000040)='./file0\x00', 0x40400, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffefffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1859.089154] attempt to access beyond end of device [ 1859.089154] loop5: rw=34817, want=24, limit=14 07:14:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xfffffff0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:37 executing program 1: ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000400000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00b9002421f6c41d493a633bb5708ca47893ad93d9b31928c8cb0eb7ed36956afcd9891ec28836bcd22a2bcf07f571484f660c7f5b0b36299674f31993ecc3f647dacf0a71a1c955b999d3b7771340e2f0610bff45475e87ae3b15351a8b2ee79800dd43839153aebbbd81ac54673db5d2f757e25ea4ce5027f3ff664d21cf116c7449638c226cb16507cffdf0f372eaa12f915d6784a7349a864bbb786ed5a9554a55e2483c06f5a3102fc6"]) [ 1859.416229] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 4)! [ 1859.416244] EXT4-fs (loop1): group descriptors corrupted! 07:14:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xb, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:14:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xc, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:14:51 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x1f00, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:51 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x112, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:14:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xffffffff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x22, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6gre0\x00', 0x31) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) 07:14:51 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeed}], 0x40, &(0x7f0000000340)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file2\x00', 0x400, 0x6f) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x35bd, &(0x7f0000000180)={0x0, 0xab54, 0x2, 0x0, 0x145, 0x0, r2}, &(0x7f0000fed000/0x12000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) syz_io_uring_complete(r4) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:14:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x0}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:14:51 executing program 5: ioctl$CDROMREADALL(0xffffffffffffffff, 0x5318, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x97d, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x5) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="04001000000000002e2f66696c653100"]) copy_file_range(r0, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x77) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchmod(0xffffffffffffffff, 0xa0) perf_event_open(&(0x7f0000000d00)={0x5, 0x80, 0xff, 0x5, 0x8, 0x3, 0x0, 0x8, 0x80000, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x1, @perf_config_ext={0xbf9, 0x8000}, 0x4021, 0x1f6, 0x0, 0xe, 0x0, 0x5, 0x8, 0x0, 0x1, 0x0, 0x100000000}, 0x0, 0x2, 0xffffffffffffffff, 0x1) ioctl$sock_SIOCGIFINDEX(r5, 0x8914, &(0x7f0000000140)={'lo\x00'}) r6 = eventfd(0x9) dup2(r5, r6) truncate(&(0x7f0000003200)='./file1\x00', 0x100000000003) 07:14:51 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x8100, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1873.305286] attempt to access beyond end of device [ 1873.305286] loop4: rw=2049, want=148, limit=14 [ 1873.360068] attempt to access beyond end of device [ 1873.360068] loop4: rw=34817, want=24, limit=14 [ 1873.360710] attempt to access beyond end of device [ 1873.360710] loop4: rw=0, want=21, limit=14 [ 1873.406229] attempt to access beyond end of device [ 1873.406229] loop4: rw=34817, want=148, limit=14 [ 1873.441151] attempt to access beyond end of device [ 1873.441151] loop4: rw=34817, want=24, limit=14 07:15:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xd, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:15:05 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x113, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xc, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:15:05 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xc00e, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:05 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r0, 0xa0) openat(r0, &(0x7f0000000280)='./file0\x00', 0xdc002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x24200, 0x20) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:15:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0xfffffff0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:15:05 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x2}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:15:05 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000600), &(0x7f0000000240)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c83f160ae672b659691906d6b667329666174000208", 0xfffffffffffffcb8, 0x200004}, {0x0, 0x0, 0xeef}], 0x23, &(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES64, @ANYRESDEC=0x0, @ANYRES64=0x0, @ANYRES64]) openat(r0, &(0x7f00000004c0)='./file1/file0\x00', 0x321000, 0x2) r1 = getuid() mount$9p_fd(0x0, &(0x7f00000003c0)='./file1/../file0\x00', &(0x7f00000005c0), 0x1010, &(0x7f0000000740)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_loose}, {@access_uid}, {@access_user}, {@uname={'uname', 0x3d, '/dev/vcs#\x00'}}, {@dfltuid}], [{@smackfsdef={'smackfsdef', 0x3d, '$\x11$,--{'}}, {@fowner_lt={'fowner<', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x62, 0x66, 0x35, 0x62, 0x63, 0x38, 0x35], 0x2d, [0x62, 0x35, 0x32, 0x33], 0x2d, [0x39, 0x37, 0x33, 0x32], 0x2d, [0x37, 0x38, 0x3e, 0x32], 0x2d, [0x32, 0x37, 0x38, 0x33, 0x61, 0x31, 0x37, 0x3]}}}]}}) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r2, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000340), 0x8, 0x40a180) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r5, 0x8008f512, &(0x7f0000000380)) ioctl$MON_IOCX_GETX(r4, 0x4018920a, &(0x7f00000001c0)={&(0x7f0000000180), &(0x7f0000000280)=""/130, 0x82}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="ff010000000000002e2f66696c65312f66696c65300002f2e94ff4472ef707c605e47ad21b6c8f9cccff0f6084c065075c5f642d8ba577d9ac93c0433fd88dfbc1f7939e2c495d6cf2ecc967ed80cf35572d7338342da0e21139bd5d8b4e714438fd8b29cd9421fb07d00aae39321dbb9c8d4c2fdb498293b31f72849f8c9e8a4edea1"]) ioctl$FIGETBSZ(r6, 0x2, &(0x7f0000000400)) truncate(&(0x7f0000003200)='./file1\x00', 0x3) unlinkat(r5, &(0x7f0000000440)='./file0\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000100)='./file1\x00', 0xa) mkdirat(r6, &(0x7f0000000480)='./file1/../file0\x00', 0x0) 07:15:05 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x114, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:05 executing program 1: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x8100, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:05 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x8}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:15:05 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xf000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1886.719370] attempt to access beyond end of device [ 1886.719370] loop5: rw=2049, want=148, limit=14 [ 1886.724092] attempt to access beyond end of device [ 1886.724092] loop5: rw=34817, want=24, limit=14 [ 1886.724477] attempt to access beyond end of device [ 1886.724477] loop5: rw=0, want=21, limit=14 [ 1886.781510] attempt to access beyond end of device [ 1886.781510] loop5: rw=34817, want=24, limit=14 [ 1886.781886] attempt to access beyond end of device [ 1886.781886] loop5: rw=0, want=21, limit=14 07:15:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xe, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:15:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xc, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:15:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) unlinkat(r1, &(0x7f0000000100)='./file1\x00', 0x200) 07:15:20 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x115, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x12}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:15:20 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xff00, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:20 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x80000001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ppoll(&(0x7f0000000100)=[{r1, 0x88}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0xffffffff]}, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:15:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xd, 0x1e, 0x1b9, &(0x7f0000000200)}) [ 1902.290350] attempt to access beyond end of device [ 1902.290350] loop5: rw=2049, want=148, limit=14 [ 1902.305930] attempt to access beyond end of device [ 1902.305930] loop4: rw=2049, want=148, limit=14 [ 1902.306565] attempt to access beyond end of device [ 1902.306565] loop5: rw=34817, want=24, limit=14 [ 1902.313681] attempt to access beyond end of device [ 1902.313681] loop5: rw=0, want=21, limit=14 [ 1902.318896] attempt to access beyond end of device [ 1902.318896] loop4: rw=34817, want=24, limit=14 07:15:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000010405000000000000000000000001000500010001"], 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c00000001040500000000000000000000002400050001000100858b"], 0x1c}}, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/512], 0x200) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="667265657a65722c00829c6af8798eca3f604a4bb83928018eb2e30d9e0f60959edc753bd72e2183"]) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r3, 0x0, 0xfdf, 0x2, 0x3}) lstat(0x0, 0x0) 07:15:20 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x116, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:15:20 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x34000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRESDEC]) acct(&(0x7f0000000100)='./file1\x00') chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1/file0\x00', 0x505142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:15:20 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x10080, 0x40) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000000180)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:15:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x2}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:15:21 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x80000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1902.351486] attempt to access beyond end of device [ 1902.351486] loop5: rw=34817, want=148, limit=14 [ 1902.358495] attempt to access beyond end of device [ 1902.358495] loop5: rw=0, want=21, limit=14 [ 1902.401058] attempt to access beyond end of device [ 1902.401058] loop4: rw=0, want=21, limit=14 [ 1902.423994] attempt to access beyond end of device [ 1902.423994] loop4: rw=34817, want=148, limit=14 [ 1902.436204] attempt to access beyond end of device [ 1902.436204] loop4: rw=0, want=21, limit=14 [ 1902.854809] FAT-fs (loop5): Unrecognized mount option "0177777777777777777777718446744073709551615" or missing value [ 1902.955738] Process accounting resumed 07:15:36 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x117, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:36 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:15:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x3}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:15:36 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x400000, 0x0) 07:15:36 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) unlinkat(r1, &(0x7f0000000100)='./file1\x00', 0x200) 07:15:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xe, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:15:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x10, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:15:36 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x400300, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x4}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:15:36 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xf0ffff, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:36 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x118, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:36 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x77, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000300)="eb0470000400f80121c9c5000000000000000000000000000000c3523c01a6a64c068329a656d5585efc4f3289fda4563f38721f0ae29a9ccb440d2e61383fb6b69cbc5928f14329ccfcb8a53234a1e102b4593a805af071faa58043c048548361a2706ec4c3fa531374e28cc953fa184f29e5321fb1d24e6a3fbdb359a73112f13a99b4dee3", 0x86, 0x800}, {0x0, 0x0, 0x5}], 0x4002, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) syz_mount_image$nfs(&(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x3f, 0x0, &(0x7f00000001c0), 0x41, &(0x7f0000000280)={[{}, {'vfat\x00'}, {}, {'vfat\x00'}, {'vfat\x00'}, {'&-+,:@[@'}, {'vfat\x00'}, {'vfat\x00'}, {'vfat\x00'}, {'vfat\x00'}], [{@fsuuid={'fsuuid', 0x3d, {[0x36, 0x62, 0x33, 0x34, 0x33, 0x30, 0x62, 0x62], 0x2d, [0x31, 0x64, 0x61, 0x35], 0x2d, [0x35, 0x35, 0x62, 0x33], 0x2d, [0x66, 0x37, 0x32, 0x63], 0x2d, [0x61, 0x34, 0x32, 0x31, 0x61, 0x65, 0x36, 0xd2a8fa1542c00b53]}}}]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:15:36 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r0, 0xa0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000000)={0x3, 0x1}) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6487, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000700)='clear_refs\x00') writev(r1, &(0x7f0000000380)=[{&(0x7f0000000040)='3', 0x1}], 0x1) socket$unix(0x1, 0x1, 0x0) openat$incfs(r1, 0x0, 0x0, 0x96) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002fc0)=[@rights={{0x10}}], 0x10}, 0x1) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000300)) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)={'L-'}, 0x16, 0x3) r2 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={'\x00', 0x0, 0x10001, 0xffffffff, 0x7, 0x3, r2}) connect$unix(0xffffffffffffffff, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) 07:15:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x5}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1917.861496] attempt to access beyond end of device [ 1917.861496] loop4: rw=2049, want=24, limit=14 [ 1917.890551] attempt to access beyond end of device [ 1917.890551] loop5: rw=2049, want=148, limit=14 [ 1917.904116] attempt to access beyond end of device [ 1917.904116] loop5: rw=34817, want=24, limit=14 [ 1917.909545] attempt to access beyond end of device [ 1917.909545] loop5: rw=0, want=21, limit=14 [ 1917.919628] attempt to access beyond end of device [ 1917.919628] loop1: rw=2049, want=148, limit=14 [ 1917.920296] attempt to access beyond end of device [ 1917.920296] loop1: rw=34817, want=24, limit=14 [ 1917.921784] attempt to access beyond end of device [ 1917.921784] loop1: rw=0, want=21, limit=14 [ 1917.991813] attempt to access beyond end of device [ 1917.991813] loop4: rw=1, want=21, limit=14 [ 1918.127890] FAT-fs (loop4): Unrecognized mount option "¶œ¼Y(ñC)Ìü¸¥24¡á´Y:€Zðqú¥€CÀHTƒa¢pnÄÃúStâŒÉSúO)å2±ÒNj?½³Y§1ñ:™´Þã" or missing value 07:15:36 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x119, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:36 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x1000000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1918.471827] FAT-fs (loop4): Unrecognized mount option "¶œ¼Y(ñC)Ìü¸¥24¡á´Y:€Zðqú¥€CÀHTƒa¢pnÄÃúStâŒÉSúO)å2±ÒNj?½³Y§1ñ:™´Þã" or missing value [ 1918.561080] attempt to access beyond end of device [ 1918.561080] loop5: rw=34817, want=148, limit=14 [ 1918.562762] attempt to access beyond end of device [ 1918.562762] loop5: rw=0, want=21, limit=14 07:15:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x10, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:15:52 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) setxattr(&(0x7f0000000100)='./file1\x00', &(0x7f0000000180)=@random={'trusted.', ':\x00'}, &(0x7f00000001c0)='vfat\x00', 0x5, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:15:52 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x6}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:15:52 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000100)=""/38, 0x26}, {&(0x7f0000000280)=""/159, 0x9f}, {&(0x7f0000000180)=""/100, 0x64}, {&(0x7f0000000340)=""/127, 0x7f}, {&(0x7f00000003c0)=""/9, 0x9}, {&(0x7f0000000400)=""/76, 0x4c}, {&(0x7f0000000480)=""/53, 0x35}, {&(0x7f00000004c0)=""/179, 0xb3}], 0x8, 0x5, 0x5) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:15:52 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x11a, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:52 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x2000000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x11, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:15:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a000f", 0xf, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') mount(&(0x7f00000000c0)=@sr0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x18, &(0x7f00000001c0)='!\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000440)=ANY=[], 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 07:15:52 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x7}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:15:52 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x11b, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:52 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x3000000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:53 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000400)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x80000, 0x1) copy_file_range(r3, 0x0, r2, 0x0, 0x4000000010000, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL, 0x0) r5 = syz_io_uring_setup(0x4, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r6}}, 0x201) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_STATX={0x15, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000440)='./file0\x00', 0x2, 0x400, 0x1, {0x0, r6}}, 0x9) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x543c00, 0x0) openat(r7, &(0x7f0000000180)='./file1\x00', 0x10f800, 0x8f) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r8, 0x0, r4, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:15:53 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x4000000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:53 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000002880)={0x1, 0xb9, 0x4, 0x800, 0x2d}) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) recvmsg$unix(r0, &(0x7f00000001c0)={&(0x7f0000000280), 0x6e, &(0x7f0000002780)=[{&(0x7f00000028c0)=""/79, 0x4f}, {&(0x7f0000000380)=""/164, 0xa4}, {&(0x7f0000000440)=""/157, 0x9d}, {&(0x7f0000000500)=""/203, 0xcb}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/162, 0xa2}, {&(0x7f00000026c0)=""/157, 0x9d}], 0x8, &(0x7f0000002800)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}, 0x40000000) ioctl$KDDELIO(r5, 0x4b35, 0x0) renameat2(r1, &(0x7f0000000100)='./file0\x00', r4, &(0x7f0000000180)='./file1\x00', 0x4) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x1, 0x80) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:15:53 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x11c, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:53 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x9}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1934.458977] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1934.464742] handle_bad_sector: 1 callbacks suppressed [ 1934.464758] attempt to access beyond end of device [ 1934.464758] loop5: rw=2049, want=148, limit=14 [ 1934.472751] attempt to access beyond end of device [ 1934.472751] loop5: rw=34817, want=24, limit=14 [ 1934.473865] attempt to access beyond end of device [ 1934.473865] loop5: rw=0, want=21, limit=14 [ 1934.494376] attempt to access beyond end of device [ 1934.494376] loop5: rw=34817, want=148, limit=14 [ 1934.787572] attempt to access beyond end of device [ 1934.787572] loop4: rw=2049, want=148, limit=14 [ 1934.790895] attempt to access beyond end of device [ 1934.790895] loop4: rw=34817, want=24, limit=14 [ 1934.845337] attempt to access beyond end of device [ 1934.845337] loop4: rw=0, want=21, limit=14 [ 1934.923217] attempt to access beyond end of device [ 1934.923217] loop5: rw=2049, want=24, limit=14 [ 1935.008874] attempt to access beyond end of device [ 1935.008874] loop5: rw=1, want=21, limit=14 [ 1935.073185] attempt to access beyond end of device [ 1935.073185] loop4: rw=34817, want=148, limit=14 07:15:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x11, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:15:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a000f", 0xf, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') mount(&(0x7f00000000c0)=@sr0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x18, &(0x7f00000001c0)='!\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000440)=ANY=[], 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 07:15:53 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0xf}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:15:53 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x8000000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:15:53 executing program 5: r0 = syz_mount_image$nfs4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000580)=[{&(0x7f0000000280)="f68a5c50d909dcfe10377ccb092db667c48a3f7ff4107457568c5b6b83a94bb12a3d33ac004c6bca44005b2e4af3bb848a8053fde4abb771e3dd0e45899e3b3cdf16d5968e822e5860a1e431884f192ed26fabb5d3da991df3ab40d8b272e0173e14ed7089a7b43f057aaa2b5293c2cd47df4928f0f2d1b357eb340b39a2caee", 0x80, 0x80}, {&(0x7f0000000300)="6d0ad3c0b8271f5cc353d581bf6c64d251178bc20d68b3a4298be631e36b98c00446dd3aaf6575c7c2a8d937c8f67e358c086ff1", 0x34, 0x10000000000000}, {&(0x7f0000000340)="70a1ebcac4de20dc682c38978bb95cb2a050291c36a4af6f99bccb1ab4afa90ab7bfdd84f445dd2280e05ef83369496af92f5f147a65a8beaf8168d9670cfe6641ad238ff894a078ce1ebbdc6d3a7a3a393cdc6ead6b09fb371f14907b1d22f7abae0827d2b47df5804f4e252b0c461f5f30a2af2100ecd73ca9346b4d243c2bb05c2be3e4af656885e301b02e9e10b0310ef6ecafbf805b20bed047d413e232353a1748ae58589f817fc91e01b270069355ffe9becaa41f0aa2c5fd86071b5809cadd49a9ad4e07b80ef7d99e70ba15adbf7ca0d7d2b8abc6", 0xd9, 0x20000000000000}, {&(0x7f0000000440)="86254dd38f1932eed84867a2f1b9dc75ec2b66fab86a23aab66e39cf672da2a6b313cd6d4f248ca4e0e6dbebea3e028dd098f44d5601f6ad67", 0x39, 0x7fffffff}, {&(0x7f0000000480)="f7c5706771119752e8741afc5eaa8614b62e4a86e65b223fc35947375729c85718e68bb6a4ca1c765fd7582e66ec4201428aa400d1ac7d37f1b3", 0x3a, 0x1}, {&(0x7f00000004c0)="e6930ce0f78c4f081eeb15fbb77ecac2dff5135749a297be58233eb75622bd829a58bfeddab995ebc2563ad2284aad34e3e97c6e5e0108a8ecaf424672b7b8ed37c2e5490fc6c82457898cc773b33101a350abbdfccb02fedbd1d7565b1709be60a4942319fa6ab3d3c9eca8ec8e334b8a449824cd6f2df2e86e0d6060d25f22d1d99883714628524d6ac957a81239982eeacd2e1f5f61f01ce1f63386a13fbf29c700496dd2a6600a82bf19d7b2ecb5975caee16e7ff7fbe1321eab0c6191", 0xbf, 0x96}], 0x2040041, &(0x7f0000000640)={[{'%]'}, {'vfat\x00'}, {'\'.\\^-/,:'}], [{@obj_role={'obj_role', 0x3d, 'vfat\x00'}}, {@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, 'vfat\x00'}}, {@fsmagic}, {@dont_measure}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}, {@dont_appraise}, {@dont_hash}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}) fchdir(r0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000100)='./file1\x00') chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:15:53 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x11d, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1935.237515] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1935.241302] FAT-fs (loop5): Unrecognized mount option "p¡ëÊÄÞ Üh" or missing value [ 1935.533249] FAT-fs (loop5): Unrecognized mount option "p¡ëÊÄÞ Üh" or missing value 07:16:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:16:13 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x1000040, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x323000, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:16:13 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x11e, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:16:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x12, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:16:13 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xa000000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:16:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x12, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:16:13 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x1, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:16:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/protocols\x00') pread64(r0, &(0x7f0000000080)=""/238, 0xee, 0x76) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) lseek(0xffffffffffffffff, 0x100000000, 0x1) fchmod(r1, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00'}) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) fchmod(r2, 0xa0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000240)) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x401, 0x0, 0x0, {0x7, 0x0, 0x5}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40000c0) 07:16:13 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f0000000100)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:16:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x2}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:16:13 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xf000000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:16:13 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x121, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:16:13 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r0, 0xa0) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:16:13 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x10a) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) openat(r3, &(0x7f0000000100)='./file1\x00', 0x414d645fd69c37bc, 0x160) 07:16:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x3}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 1955.132001] handle_bad_sector: 1 callbacks suppressed [ 1955.132018] attempt to access beyond end of device [ 1955.132018] loop4: rw=2049, want=148, limit=14 07:16:14 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x17020000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1955.164044] attempt to access beyond end of device [ 1955.164044] loop5: rw=2049, want=148, limit=14 [ 1955.172825] attempt to access beyond end of device [ 1955.172825] loop5: rw=0, want=21, limit=14 07:16:14 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x122, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1955.180149] attempt to access beyond end of device [ 1955.180149] loop5: rw=34817, want=148, limit=14 [ 1955.183157] attempt to access beyond end of device [ 1955.183157] loop5: rw=0, want=21, limit=14 [ 1955.189744] attempt to access beyond end of device [ 1955.189744] loop4: rw=2049, want=21, limit=14 [ 1955.282003] attempt to access beyond end of device [ 1955.282003] loop4: rw=1, want=21, limit=14 [ 1955.301150] attempt to access beyond end of device 07:16:14 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="80009a000008b3160a010194040100940494044100940398000000000000000000000000000000000057ed2f8ae3c3b9bfd631bf9bcc804cfa9b0cdadcaf64e3929ef89ea5b078caf50e7715ea5d9cedb5c3662829b69a79ff2df58eff34db160382d0c3aef4ed13bf6725cb6531b51a5e064efb5d81083ce0c6f8644a62343030232b11cfd4e62a2420414b4ea167167f0c49be9615a543c90eb964f8755901ee7f0b8f43f3dba2507a032f1a6b5a2e548da0854915ddf6af91d6533d258afae8e98559f1405dce0c90920e6396eb7592370fcaac11079582514849f2942dba5a0feec92ae7d8"]}) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x43}}}, 0x14) fchmod(r2, 0xa0) unlinkat(r2, &(0x7f0000000180)='./file1\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) copy_file_range(0xffffffffffffffff, 0x0, r3, 0x0, 0x804, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(r5, 0x8914, &(0x7f0000000280)={'vlan1\x00'}) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000100)) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1955.301150] loop5: rw=2049, want=148, limit=14 [ 1955.307489] attempt to access beyond end of device [ 1955.307489] loop5: rw=34817, want=24, limit=14 [ 1955.308532] attempt to access beyond end of device [ 1955.308532] loop5: rw=0, want=21, limit=14 07:16:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:16:29 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x1f000000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:16:29 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x3}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:16:29 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x123, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:16:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x41, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:16:29 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:16:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1b, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:16:29 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d5d6600020801200470000400f801", 0x12}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000100)={'wg1\x00'}) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:16:29 executing program 5: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000280)=ANY=[@ANYRESDEC]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0), 0x3ff, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r3, 0xc05c5340, &(0x7f00000002c0)={0x5, 0x800, 0x7, {0x7, 0x3ff}, 0x7ff, 0x81}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r4, 0x0, 0x800, 0x0) r6 = open$dir(&(0x7f0000000100)='./file1\x00', 0x505000, 0x11) truncate(&(0x7f0000003200)='./file1\x00', 0x3) openat(r6, &(0x7f0000000180)='./file1\x00', 0x751140, 0x8) fcntl$setstatus(r0, 0x4, 0x80800) 07:16:29 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f0000000100)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1971.522643] FAT-fs (loop4): invalid media value (0x00) [ 1971.522660] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1971.535270] FAT-fs (loop5): Unrecognized mount option "18446744073709551615" or missing value [ 1971.775962] FAT-fs (loop5): Unrecognized mount option "18446744073709551615" or missing value [ 1971.781552] handle_bad_sector: 8 callbacks suppressed [ 1971.781570] attempt to access beyond end of device [ 1971.781570] loop1: rw=2049, want=148, limit=14 [ 1971.840965] attempt to access beyond end of device [ 1971.840965] loop1: rw=34817, want=24, limit=14 [ 1971.854248] attempt to access beyond end of device [ 1971.854248] loop1: rw=0, want=21, limit=14 [ 1971.925338] FAT-fs (loop4): invalid media value (0x00) [ 1971.925355] FAT-fs (loop4): Can't find a valid FAT filesystem 07:16:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x26, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:16:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:16:45 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x2000, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:16:45 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5e033, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$BTRFS_IOC_SNAP_DESTROY(0xffffffffffffffff, 0x5000940f, &(0x7f0000002300)={{r0}, "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"}) readv(0xffffffffffffffff, &(0x7f0000002300), 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x7fffffff, 0x5, 0x3}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x81000}, 0xffffff25, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYRES64=r2, @ANYBLOB="dc668455a4bd18c380458c7ae9d78e967dd1f4c00b187cd2a67d91bc48e2b769b96694444d8f12df8680f3bdbe177242964243f1934d3c84564f"], 0x21a8}, 0x1, 0x0, 0x0, 0x24048090}, 0x4004000) syz_io_uring_submit(0x0, 0x0, &(0x7f00000022c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x65131b18345537cf, 0x0, 0x0, 0x1}, 0x1f5) fork() 07:16:45 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x81000000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:16:45 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x124, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:16:45 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r2, 0xa0) openat(r2, &(0x7f0000000100)='./file0\x00', 0x20042, 0xc8) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r5, 0xa0) openat(r5, &(0x7f0000000180)='./file0\x00', 0x2, 0x4) 07:16:45 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = dup3(r1, r0, 0x0) getdents(r3, &(0x7f0000000280)=""/233, 0xe9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r4, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:16:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x27, 0x1e, 0x1b9, &(0x7f0000000200)}) [ 1987.252778] attempt to access beyond end of device [ 1987.252778] loop5: rw=2049, want=148, limit=14 07:16:45 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x125, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1987.263984] attempt to access beyond end of device [ 1987.263984] loop5: rw=34817, want=24, limit=14 [ 1987.267606] attempt to access beyond end of device [ 1987.267606] loop5: rw=0, want=21, limit=14 07:16:45 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x10, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:16:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:16:45 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x9effffff, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:16:45 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xc00e0000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:16:45 executing program 1: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002600), 0x0, &(0x7f00000028c0)={[{@fat=@nfs_nostale_ro}]}) r1 = fork() r2 = fcntl$dupfd(r0, 0x406, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb, 0xca, 0xd0, 0x9, 0x0, 0x9, 0x200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x1ff}, 0x40001, 0xce, 0xfffffffc, 0x3, 0xae5, 0x0, 0x6, 0x0, 0xfffffffa, 0x0, 0x1}, r1, 0x7, r2, 0x1) 07:16:45 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xf0ffffff, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:16:45 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x440000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) [ 1987.312114] attempt to access beyond end of device [ 1987.312114] loop4: rw=2049, want=148, limit=14 [ 1987.327343] attempt to access beyond end of device [ 1987.327343] loop4: rw=34817, want=24, limit=14 [ 1987.328070] attempt to access beyond end of device [ 1987.328070] loop4: rw=0, want=21, limit=14 [ 1987.354134] attempt to access beyond end of device [ 1987.354134] loop4: rw=34817, want=24, limit=14 [ 1987.354341] attempt to access beyond end of device [ 1987.354341] loop4: rw=0, want=21, limit=14 [ 1987.363163] attempt to access beyond end of device [ 1987.363163] loop5: rw=34817, want=24, limit=14 [ 1987.363626] attempt to access beyond end of device [ 1987.363626] loop5: rw=0, want=21, limit=14 [ 1987.410306] FAT-fs (loop1): bogus number of reserved sectors [ 1987.410315] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1987.447072] FAT-fs (loop1): bogus number of reserved sectors [ 1987.447081] FAT-fs (loop1): Can't find a valid FAT filesystem 07:17:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x8}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x41, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:17:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x28, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:17:02 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xff000000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:02 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x126, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0xe1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r1, 0x2) r2 = socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x2, 0x2, 0x83, 0x6, 0x0, 0x520a, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_config_ext={0x9, 0x8}, 0xa040, 0x0, 0x3, 0x8, 0x8000, 0x4, 0x3f, 0x0, 0x1, 0x0, 0x2c09e477}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) readv(r2, &(0x7f0000000640)=[{&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000180)=""/144, 0x90}, {&(0x7f00000006c0)=""/84, 0x54}, {&(0x7f00000003c0)=""/238, 0xee}, {&(0x7f00000004c0)=""/187, 0xbb}, {&(0x7f0000000580)=""/182, 0xb6}], 0x6) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000280)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x90, 0x0, &(0x7f0000000840)="9e7706c0fa186e9aba260703435e4e98d048c0ff5f932571737ae5a666ec5ab40bdcba89c2eaa73649aed3b1a036e5e4b6bebedfdb6dd51b5cb14e921d63709a70bb7bd7c243dbbc3a0e189270bedf8d7330d0e4b11cc746c00ca70ae7ae98c6b25074dbb2561fd5ffc13e3bba4b4b9e27b9b10a68fa4be2a710e8b7b5777bfd52423631328abd595ae98f466b576de6"}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) unshare(0x48020200) 07:17:02 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0xa) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:17:02 executing program 5: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r3, 0xa0) openat(r0, &(0x7f00000001c0)='./file2\x00', 0x80, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x3c5142, 0x93) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r6 = eventfd(0x1) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) copy_file_range(r5, 0x0, r4, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) mkdir(&(0x7f0000000100)='./file0\x00', 0x2) 07:17:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:02 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x127, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:02 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xfffff000, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:02 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x128, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0xf}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:02 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) r5 = openat$cgroup_devices(r0, &(0x7f0000000180)='devices.allow\x00', 0x2, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r5, 0xc0389424, &(0x7f0000000280)={0xf7bf, 0x20, '\x00', 0x1, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0]}) faccessat(r4, &(0x7f0000000100)='./file0\x00', 0x140) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:17:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0xf0}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 2003.766313] handle_bad_sector: 4 callbacks suppressed [ 2003.766329] attempt to access beyond end of device [ 2003.766329] loop5: rw=2049, want=148, limit=14 07:17:02 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x129, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 2003.809623] attempt to access beyond end of device [ 2003.809623] loop4: rw=2049, want=148, limit=14 [ 2003.813724] attempt to access beyond end of device [ 2003.813724] loop4: rw=34817, want=24, limit=14 [ 2003.821176] attempt to access beyond end of device [ 2003.821176] loop4: rw=0, want=21, limit=14 [ 2003.862536] attempt to access beyond end of device [ 2003.862536] loop4: rw=34817, want=148, limit=14 [ 2004.077439] attempt to access beyond end of device [ 2004.077439] loop4: rw=2049, want=148, limit=14 [ 2004.082966] attempt to access beyond end of device [ 2004.082966] loop4: rw=34817, want=24, limit=14 [ 2004.137074] attempt to access beyond end of device [ 2004.137074] loop4: rw=0, want=21, limit=14 [ 2004.260335] attempt to access beyond end of device [ 2004.260335] loop4: rw=34817, want=148, limit=14 [ 2004.268470] attempt to access beyond end of device [ 2004.268470] loop4: rw=34817, want=24, limit=14 07:17:18 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x12a, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:18 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xffffff7f, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:18 executing program 1: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r3, 0xa0) openat(r0, &(0x7f00000001c0)='./file2\x00', 0x80, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x3c5142, 0x93) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r6 = eventfd(0x1) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) copy_file_range(r5, 0x0, r4, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) mkdir(&(0x7f0000000100)='./file0\x00', 0x2) 07:17:18 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$nfs(&(0x7f0000000280), &(0x7f00000002c0)='./file1\x00', 0x100, 0x7, &(0x7f0000000700)=[{&(0x7f0000000300)="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", 0xfa, 0x61}, {&(0x7f0000000400)="fb6d522fcc9316121a94a3479db2811b3cbc19a2f3dab9b6af3e0613b880efd2020c3fd57a0f4a78a346e220de519b030d9b20e9f63a2a37fdc4ebe8404b46a8eeb075e2b613d998eb8b113bf5e426e28fe848ba133da78674e6cebd3b6330f817541aa500cb990ce3b7b6882d028ebaec3496f7446b6916371df96d9b81926551f2e4d0b891932006385d2f16251adb534ecac2a9988233b24b3db2cd6bb644f8b733a885fa6198c4a70291bf528d2ce398c3c33a3498f7d5f896853c29e53afe06d3cdf210b67289dfc899", 0xcc, 0xfffffffffffffffe}, {&(0x7f00000008c0)="2aab09c6208bcf53f2bb4eb0e60894fc1e120160b9dcec3b4c62a62990704ec208a1fd9f5364537e205a6ae348f4445f8728088d5222c55ab513d2e2520ead2f774e078ba874c3c6200d31760539387db698f95f8b328adfa7d4946773736482fa960a3a9a2a4509bd99980e21f6ae2db91a75d34c247b451a7a047fcf7fc1a877ff1952d9c9565e269f13158841d4ec9014feedbff8d549833f247e5448232fc93b8d0c56af6ce9ce6f09365233ab3cacfb1d1469366bca", 0xb8, 0x1}, {&(0x7f0000000540)="4e047ce72dc39bab760d9f5408ee5042ec9e3cf898627f302ae695796cc6240fe0bbd319d3faa3e8b7abdba4b0fc1e4486a6", 0x32, 0x8}, {&(0x7f0000000580)="384f1d7707e1e1507151cab286919ed0601f2597a58431f8a16b326a6f4118a5cc7f16a4385bf7100fea61281b0327e19fbe37cc647bffcb2d602d2d06b136273b3c62b0ab5a260b0d321e3529fbdabfa6791512406f5aa1ede0eaa356eb122fc1bb5f457cd96ea06f8c2beaf8945ff63fcf5110d5ea814cf0fc4b21b2d39a2de641fc2b3207e65b6c179c246c6560894dd9887166dd10be4d343c73878098edcc58edfc8dfc", 0xa6, 0x1f}, {&(0x7f0000000640)="c2980bc2887cba6d2a49aa6fe0c26045e3ce894ed76fac3eeb2de1999960e85f2e9e581c07", 0x25, 0x49421e2}, {&(0x7f0000000680)="66584328944ad0e6d703446b2a45dec36bbb6c7e868ad52eba62b94659b35a167c9cb03b7bec793e923f180e0c584ee0265069bdb5edbe2df91d0c75e10a21ebbf362a9c8e65e8f52b7ada0203ca6b24a420be7ee5aeb9dd3b0823b38ad062caf7a8737e27d5f36545854a2d289b59e103bb524e7d444ea1c4be8e4d", 0x7c, 0x20}], 0x1000, &(0x7f0000000840)={[{}, {'vfat\x00'}, {'$,&1#{7(}['}], [{@dont_measure}, {@smackfstransmute={'smackfstransmute', 0x3d, 'smackfshat'}}, {@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}]}) open_tree(r0, &(0x7f0000000800)='./file1\x00', 0x1101) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', &(0x7f0000000180)={0x41, 0x64, 0x12}, 0x18) open_tree(r5, &(0x7f00000001c0)='./file0\x00', 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r6, 0xa0) recvfrom$unix(r6, &(0x7f0000000980)=""/216, 0xd8, 0x100, &(0x7f0000000a80)=@file={0x1, './file1\x00'}, 0x6e) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:17:18 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80100, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:17:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x29, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:17:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x2000, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:17:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x300}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x480}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:18 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xffffff9e, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:18 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x12b, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x500}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:18 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x8080, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r0, 0xa0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x200000, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file1\x00') copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file0\x00', 0x3) [ 2020.214835] handle_bad_sector: 2 callbacks suppressed [ 2020.214845] attempt to access beyond end of device [ 2020.214845] loop1: rw=2049, want=148, limit=14 [ 2020.217149] attempt to access beyond end of device [ 2020.217149] loop5: rw=2049, want=24, limit=14 [ 2020.223708] attempt to access beyond end of device [ 2020.223708] loop5: rw=2049, want=21, limit=14 [ 2020.290598] attempt to access beyond end of device [ 2020.290598] loop5: rw=1, want=21, limit=14 07:17:18 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xfffffff0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 2020.446827] attempt to access beyond end of device [ 2020.446827] loop5: rw=2049, want=148, limit=14 [ 2020.452684] attempt to access beyond end of device [ 2020.452684] loop5: rw=34817, want=24, limit=14 [ 2020.515083] attempt to access beyond end of device [ 2020.515083] loop1: rw=1, want=21, limit=14 [ 2020.549043] attempt to access beyond end of device [ 2020.549043] loop5: rw=34817, want=24, limit=14 07:17:31 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x12c, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:31 executing program 5: sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, 0x1, 0x2, 0x5, 0x0, 0x0, {0x7b1d490c9b9ac1f1, 0x0, 0x1}, [@CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xff}, @CTA_EXPECT_TIMEOUT={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x4000040) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x4, &(0x7f0000000400)=[{&(0x7f0000000300)="eb3c906d6b66732e666174000208010004700004c372f02b757ddc9ddafbc721e7d200f801", 0x25, 0xb}, {0x0, 0x0, 0xeef}, {&(0x7f0000000340)="64007ae5e8fefc7d1318ba854a58cc0760efb2a8dce25b743b07e8441678ced9c5746ef9f88df4357f1afc5967182a545ec0bb312c2f292e6af286bc8fd15176dd57b3e59d781b4ab5b4bf207dd5818b6bd9ba72ebc35ebdaca0aee5e99bdf02adabeac51906e5f2182bf121f2ecb9ae372bb91e6b4780f1707cb62a312ce4dc8a73b1b99a22476bd634b81fb4376c62fd3b319feaf7a3d18ad53cbb0ba83c7070da75cf41e345ce", 0xa8, 0xfffffffefffffeff}, {&(0x7f0000000140)="ad0eebb1c952d1cd800bc0a96fff8b059060bf8371399c2b7a677f6a62e2c5dfc2dbff069b818e4b712901982f4f8b4f2474029c19c95180", 0x38, 0x1}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x3c682, 0x0) openat(r0, &(0x7f0000000280)='./file1/file0\x00', 0x14000, 0xc0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) pread64(r1, &(0x7f0000000180)=""/128, 0x80, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) r5 = pidfd_getfd(r4, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000540)={{0x1, 0x1, 0x18, r4, {0x9}}, './file0/file0\x00'}) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) renameat2(r6, &(0x7f0000000580)='./file1\x00', r7, &(0x7f0000000600)='./file2\x00', 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000002c0)={0x0, 0x3, r5, 0x6}) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:17:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x1e, 0x2000, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:17:31 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x400, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0xffffffffffffff88}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000280)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r3, 0xa0) copy_file_range(r3, &(0x7f0000000100)=0x5, r0, &(0x7f0000000180)=0x1f, 0xcaf, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r5, 0xa0) setsockopt$netlink_NETLINK_RX_RING(r5, 0x10e, 0x6, &(0x7f00000001c0)={0x5, 0x100, 0x1, 0x9}, 0x10) 07:17:32 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0xffffffff, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x600}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=0x0]) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab39}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f00000001c0)='./file1\x00', 0x8040, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x1, 0x8) 07:17:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x2c, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:17:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x700}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:32 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x12d, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:32 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa0, r2, 0x300, 0x70bd29, 0x25dfdbff, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x4}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x10001}, @NL80211_ATTR_VENDOR_DATA={0x59, 0xc5, "e6ef8d22945de5ac41c8b3aa8816414b51e27fa6588a2a624a1c3fe0eccd56b0d3bda757a8bf81c75912a096cd87ef54bba3ee7185036ad831676693a37cbced4aba3192628116ac3db16523109851dfad77bd3b60"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0xb7e1}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x1}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x101}]}, 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x40084) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000480)={&(0x7f00000004c0)={0x28, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@nested={0x14, 0x11, 0x0, 0x1, [@generic="809801a7b0c7dba09475f251c743092f"]}]}, 0x28}}, 0x0) [ 2033.679750] FAT-fs (loop5): Unrecognized mount option "d" or missing value 07:17:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x900}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:32 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x12e, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:32 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x2, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:32 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(r1, 0x0, 0x20, 0x4) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(r1, &(0x7f0000000300)='./file0\x00', 0x250140, 0x134) r4 = gettid() r5 = syz_open_dev$vcsn(&(0x7f0000000280), 0x7, 0x18000) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8914, &(0x7f0000000140)={'lo\x00'}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00'}) dup2(r6, r7) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xff, 0x9, 0x7, 0x8, 0x0, 0x8000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0x8}, 0x8000, 0x80, 0x8001, 0x3, 0xfffffffffffffffd, 0x1, 0x7, 0x0, 0x3ff, 0x0, 0x100}, r4, 0x6, r5, 0x1) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f00000003c0)='./file0/file0\x00', 0x3) [ 2034.147780] FAT-fs (loop5): Unrecognized mount option "d" or missing value [ 2034.207033] sysfs: cannot create duplicate filename '/class/ieee80211/€˜§°ÇÛ ”uòQÇC !' [ 2034.207056] CPU: 0 PID: 12197 Comm: syz-executor.1 Not tainted 5.10.154 #1 [ 2034.207067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2034.207074] Call Trace: [ 2034.207102] dump_stack+0x107/0x167 [ 2034.207129] sysfs_warn_dup.cold+0x1c/0x29 [ 2034.207155] sysfs_do_create_link_sd+0x122/0x140 [ 2034.207182] sysfs_create_link+0x5f/0xc0 [ 2034.207204] device_add+0x703/0x1bc0 [ 2034.207231] ? devlink_add_symlinks+0x970/0x970 [ 2034.207253] ? ieee80211_set_bitrate_flags+0x202/0x620 [ 2034.207287] wiphy_register+0x1da6/0x2850 [ 2034.207328] ? wiphy_unregister+0xae0/0xae0 [ 2034.207376] ? ieee80211_init_rate_ctrl_alg+0x121/0x500 [ 2034.207404] ieee80211_register_hw+0x23c5/0x3870 [ 2034.207448] ? ieee80211_ifa6_changed+0x610/0x610 [ 2034.207478] ? lock_downgrade+0x6d0/0x6d0 [ 2034.207496] ? lockdep_init_map_type+0x2c7/0x780 [ 2034.207523] ? memset+0x20/0x50 [ 2034.207545] ? __hrtimer_init+0x12c/0x270 [ 2034.207576] mac80211_hwsim_new_radio+0x1f5c/0x4600 [ 2034.207626] ? hwsim_virtio_rx_work+0x350/0x350 [ 2034.207644] ? hwsim_new_radio_nl+0x967/0x1080 [ 2034.207669] ? memcpy+0x39/0x60 [ 2034.207699] hwsim_new_radio_nl+0x991/0x1080 [ 2034.207730] ? mac80211_hwsim_new_radio+0x4600/0x4600 [ 2034.207777] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 2034.207799] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 2034.207832] genl_family_rcv_msg_doit+0x22d/0x330 [ 2034.207861] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 2034.207884] ? cap_capable+0x1eb/0x250 [ 2034.207924] ? ns_capable+0xdd/0x100 [ 2034.207954] genl_rcv_msg+0x33c/0x5a0 [ 2034.207983] ? genl_get_cmd+0x480/0x480 [ 2034.208006] ? mac80211_hwsim_new_radio+0x4600/0x4600 [ 2034.208035] ? lock_release+0x6b0/0x6b0 [ 2034.208055] ? __lockdep_reset_lock+0x180/0x180 [ 2034.208107] netlink_rcv_skb+0x14b/0x430 [ 2034.208130] ? genl_get_cmd+0x480/0x480 [ 2034.208155] ? netlink_ack+0xab0/0xab0 [ 2034.208191] ? netlink_deliver_tap+0x1c4/0xc40 [ 2034.208211] ? is_vmalloc_addr+0x7b/0xb0 [ 2034.208239] genl_rcv+0x24/0x40 [ 2034.208258] netlink_unicast+0x549/0x7f0 [ 2034.208290] ? netlink_attachskb+0x810/0x810 [ 2034.208330] netlink_sendmsg+0x905/0xdf0 [ 2034.208363] ? netlink_unicast+0x7f0/0x7f0 [ 2034.208403] ? netlink_unicast+0x7f0/0x7f0 [ 2034.208427] sock_sendmsg+0x154/0x190 [ 2034.208452] ____sys_sendmsg+0x70d/0x870 [ 2034.208480] ? kernel_sendmsg+0x50/0x50 [ 2034.208497] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2034.208517] ? perf_trace_lock+0xac/0x490 [ 2034.208547] ? __lockdep_reset_lock+0x180/0x180 [ 2034.208564] ? perf_trace_lock+0xac/0x490 [ 2034.208593] ___sys_sendmsg+0xf3/0x170 [ 2034.208615] ? sendmsg_copy_msghdr+0x160/0x160 [ 2034.208645] ? lock_downgrade+0x6d0/0x6d0 [ 2034.208674] ? finish_task_switch+0x126/0x5d0 [ 2034.208695] ? lock_downgrade+0x6d0/0x6d0 [ 2034.208725] ? __fget_files+0x296/0x480 [ 2034.208761] ? __fget_light+0xea/0x290 [ 2034.208794] __sys_sendmsg+0xe5/0x1b0 [ 2034.208823] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2034.208848] ? io_schedule_timeout+0x140/0x140 [ 2034.208894] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2034.208921] do_syscall_64+0x33/0x40 [ 2034.208942] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2034.208956] RIP: 0033:0x7f03c3d51b19 [ 2034.208978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2034.208989] RSP: 002b:00007f03c12a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2034.209012] RAX: ffffffffffffffda RBX: 00007f03c3e65020 RCX: 00007f03c3d51b19 [ 2034.209024] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2034.209036] RBP: 00007f03c3dabf6d R08: 0000000000000000 R09: 0000000000000000 [ 2034.209048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2034.209061] R13: 00007ffd9424ad1f R14: 00007f03c12a6300 R15: 0000000000022000 [ 2034.400200] attempt to access beyond end of device [ 2034.400200] loop5: rw=2049, want=148, limit=14 [ 2034.428119] attempt to access beyond end of device [ 2034.428119] loop5: rw=34817, want=148, limit=14 07:17:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x2d, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:17:46 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0xf00}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:46 executing program 2: removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', ':.\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:17:46 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x301142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:17:46 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x3, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:46 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x12f, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:46 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000780)={0x38, r3, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0x2, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}]}]}, 0x38}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x48, r3, 0x1, 0x0, 0x0, {0x1, 0x9}}, 0x48}}, 0x10) 07:17:46 executing program 5: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r5, 0xa0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000000280)={{0x2, 0x2}, 'port0\x00', 0x0, 0x150010, 0xffffd6a9, 0x6, 0xde, 0x2, 0x8, 0x0, 0x4}) truncate(&(0x7f0000003200)='./file1\x00', 0x3) openat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x4) 07:17:46 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x4, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 2048.368283] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2048.378648] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2048.399050] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2048.401616] attempt to access beyond end of device [ 2048.401616] loop5: rw=2049, want=148, limit=14 [ 2048.404950] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2048.409896] attempt to access beyond end of device [ 2048.409896] loop5: rw=34817, want=24, limit=14 [ 2048.417120] attempt to access beyond end of device [ 2048.417120] loop4: rw=2049, want=24, limit=14 [ 2048.431962] attempt to access beyond end of device [ 2048.431962] loop4: rw=2049, want=21, limit=14 [ 2048.462004] attempt to access beyond end of device [ 2048.462004] loop5: rw=0, want=21, limit=14 07:17:46 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x8, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:46 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x130, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:46 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0x8004}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:46 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) openat(r0, &(0x7f0000000100)='./file0\x00', 0x4202, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r3, 0xa0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000180)=0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r4, 0x0, 0x1, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:17:46 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0xa, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:46 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000340)={0x58, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x880}, 0x40) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r5, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x40100}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x1}, @ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4050) r6 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb5890536b66732e6661740002543b32260000000000000100"/37, 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000011300)) mkdirat(r6, &(0x7f0000000080)='./file0\x00', 0x0) openat(r6, &(0x7f0000000040)='./file0\x00', 0x1, 0x0) 07:17:47 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0xf000}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 2048.512288] attempt to access beyond end of device [ 2048.512288] loop4: rw=1, want=21, limit=14 [ 2048.598119] FAT-fs (loop1): invalid media value (0x00) [ 2048.598134] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2048.599752] attempt to access beyond end of device [ 2048.599752] loop4: rw=2049, want=148, limit=14 [ 2048.618816] FAT-fs (loop1): invalid media value (0x00) [ 2048.618824] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2048.656027] attempt to access beyond end of device [ 2048.656027] loop4: rw=0, want=21, limit=14 [ 2048.733162] attempt to access beyond end of device [ 2048.733162] loop5: rw=34817, want=148, limit=14 [ 2048.733750] attempt to access beyond end of device [ 2048.733750] loop5: rw=34817, want=24, limit=14 07:17:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x2e, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:17:47 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0xf, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:47 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x131, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:47 executing program 1: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(0xffffffffffffffff, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) r1 = syz_io_uring_setup(0x77f, 0x0, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000040)) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000140)) epoll_create1(0x0) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000200), r3) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="bfaf9b63714806a4e7231f", @ANYRES16=0x0, @ANYBLOB="021927bd7000fedbdf250100000008000200000000000c00030003000000000000000800040064010102080009000200000006000600030000000800040064010101080002000000000008000200010000000800090000000000080004006401010208000700", @ANYRES32=r0, @ANYBLOB], 0x70}}, 0x800) r4 = add_key$keyring(&(0x7f0000000780), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) epoll_create(0x7) keyctl$unlink(0x9, r4, 0xfffffffffffffffd) fsmount(0xffffffffffffffff, 0x1, 0xf7) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) 07:17:47 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {0x3, 0x0, 0xffff}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x588e2, 0x0, 0x0, 0x0, 0xe977ed0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 07:17:47 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x2, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 2048.960162] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.3'. 07:17:59 executing program 5: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(r0, &(0x7f0000000180)='./file1\x00', 0x8100, 0x0) r4 = openat(r2, &(0x7f0000000000)='./file1\x00', 0x402, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1c9340, 0x0) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) r6 = syz_io_uring_setup(0x7ccd, &(0x7f0000000280)={0x0, 0x2a99, 0x4, 0x3, 0x35e}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000300)) fchmod(r6, 0x2a) openat(r5, &(0x7f0000000100)='./file0\x00', 0x22000, 0x1c0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:17:59 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0xf0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:59 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) openat(r0, &(0x7f0000000100)='./file1\x00', 0x400100, 0x21) 07:17:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x30, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:17:59 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000080)={0x6, 0x17, &(0x7f0000000600)="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"}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:17:59 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x132, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:17:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x3, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:17:59 executing program 1: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(0xffffffffffffffff, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) r1 = syz_io_uring_setup(0x77f, 0x0, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000040)) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000140)) epoll_create1(0x0) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000200), r3) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="bfaf9b63714806a4e7231f", @ANYRES16=0x0, @ANYBLOB="021927bd7000fedbdf250100000008000200000000000c00030003000000000000000800040064010102080009000200000006000600030000000800040064010101080002000000000008000200010000000800090000000000080004006401010208000700", @ANYRES32=r0, @ANYBLOB], 0x70}}, 0x800) r4 = add_key$keyring(&(0x7f0000000780), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) epoll_create(0x7) keyctl$unlink(0x9, r4, 0xfffffffffffffffd) fsmount(0xffffffffffffffff, 0x1, 0xf7) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) [ 2061.602585] handle_bad_sector: 2 callbacks suppressed [ 2061.602595] attempt to access beyond end of device [ 2061.602595] loop5: rw=2049, want=148, limit=14 [ 2061.609312] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2061.646490] attempt to access beyond end of device [ 2061.646490] loop4: rw=2049, want=148, limit=14 [ 2061.647701] attempt to access beyond end of device [ 2061.647701] loop4: rw=34817, want=24, limit=14 [ 2061.648024] attempt to access beyond end of device [ 2061.648024] loop4: rw=0, want=21, limit=14 [ 2061.653802] attempt to access beyond end of device [ 2061.653802] loop4: rw=34817, want=148, limit=14 [ 2061.655285] attempt to access beyond end of device [ 2061.655285] loop4: rw=34817, want=24, limit=14 [ 2061.656582] attempt to access beyond end of device [ 2061.656582] loop4: rw=0, want=21, limit=14 [ 2061.749846] attempt to access beyond end of device [ 2061.749846] loop5: rw=2049, want=21, limit=14 [ 2061.913308] attempt to access beyond end of device [ 2061.913308] loop5: rw=1, want=21, limit=14 07:18:16 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x217, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:16 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x133, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x9, 0x6, 0x81, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040)}, 0x8202, 0x8c, 0x40, 0x2, 0x2, 0x9, 0x1f, 0x0, 0xc82767bd}, r0, 0xb, r1, 0xa) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000600)=0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x7, 0xff, 0x20, 0x2b, 0x0, 0x5, 0xc, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000140), 0x1}, 0x40800, 0x7ff, 0x6, 0x6, 0x200, 0xffffffc1, 0x7ff, 0x0, 0x3, 0x0, 0x100000001}, r2, 0xc, 0xffffffffffffffff, 0xa) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:18:16 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) pwrite64(0xffffffffffffffff, &(0x7f0000000180)="71519827c2b34b765bf6c2ad76e6b8899deb57d858b8094aa2c6c8fad59e19c2183a1f85c1bc877f52a0bd09e13754f20c3715b4cccbe597120a270b73320ef4e8de39e46fa1673f553f6f32", 0x4c, 0x81) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat2(r1, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x1010c3, 0x4}, 0x18) mkdir(&(0x7f0000000100)='./file1\x00', 0x114) openat(r0, &(0x7f0000000300)='./file0\x00', 0x143280, 0x25) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x42) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000340)={@id={0x2, 0x0, @a}, 0x2, 0x0, '\x00', @auto=[0x25, 0x3a]}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:18:16 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_io_uring_setup(0x1, &(0x7f0000000180), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000040)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x11, r3, 0x8000000) syz_io_uring_submit(r6, r5, &(0x7f0000000900)=@IORING_OP_NOP={0x0, 0x2}, 0xfffffffa) syz_io_uring_submit(0x0, r5, &(0x7f0000000040)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd_index=0xa, 0x0, 0x0, 0x80, 0x4, 0x1}, 0x4bf) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x1, &(0x7f0000000180), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000040)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x0) r9 = syz_mount_image$vfat(&(0x7f0000000940), &(0x7f0000000980)='./file0\x00', 0x1, 0x2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="3435802cbabcf095ae025f4569a364cbadde6475cb22605f747e74bc7abdab34ec5773f0cca5dc85d7a66dce40e798782cf2bffcb344e53dbfb92fd32be62d152e75e9ecdde75ccd499f1e29cd021a32ceb4119cd8f42ae552441e38ee9c9300420da8296efaa637825e5afa0d413906da036cf4ae9dc40bb03a89c71decbe76bc0302f12edced9e942011b389fd4466ab5dfd0572af8981c46e9ddc913a40b456ce215612c7bd474f7538beef014eded24f47", 0xb3, 0x1004000}, {&(0x7f0000000a80)="5d356a416a6eb84d05a2d4b116672c9800f44baa254c2bd5445fd153a25ba3fa83d680c3022a0ef21cae9c96883faee11bd822b57749c76ce1f12a5912918830f36dd5bf7805484e16beb92680d9eb05d00978388dff5332cb14b4556305f2a0a4e9510050bf33e21dbf85575a7419b657c178a6d3de9231a53a762b96690bbb230c5f25ca3a658015da8e101bda79add2736ef1d2a7dd8c6d6aabcc08f55cb9bba8c6cdf77ca34d292c5b68976595f4c1de6de38efd5aef6197e77a9d507b72a9d420df5ebe0e24ca57adc4176b155dee117d8f02bc21adb876dae8f1f9725d05e4c2a55a9d938a3c43", 0xea, 0xbd}], 0x84002, &(0x7f0000000bc0)={[{@utf8}, {@numtail}, {@utf8no}, {}, {@shortname_mixed}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fsname={'fsname', 0x3d, '\''}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^*@.\'--*$&'}}, {@dont_appraise}, {@measure}, {@uid_lt}, {@dont_appraise}]}) syz_io_uring_submit(0x0, r8, &(0x7f0000000c80)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index=0x2, 0x10000, {0x0, r9}, 0x8, 0x9, 0x0, {0x0, 0x0, r0}}, 0xffff) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0xffffffff, @local}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) splice(r2, 0x0, r1, 0x0, 0x44459cda, 0x0) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r10, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$inet6(r10, &(0x7f0000000680)={&(0x7f0000000080)={0xa, 0x4e21, 0x8, @local}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000240)="fc4e60e5e16bcf8940c9eb2d17fc1caa3af52d3b1a84d33d0aadbf7655c5931d67f52ce522e95e960fa5e472b70c1fd02386b387eeb6880d4d083df35afd2f239fc58bd1ff4c6755a609fc50ba3af542b800d6dbc3d0ff7b393faf3c4ecc3a77d913af06d90bbfa893f289daa204772f43cc77af4c7a20c474a39922a6491533428354f55113cb26432bf5a82332315a1d49dab82da5a112e4b2e5d60b328f4626289fb2fceb9962aa0cfb2f3819434795a900d08c908b4a7ca78f765087143719ad6ec79b0787311786", 0xca}, {&(0x7f0000000340)="92c6f47090b893690ce0597357f288791d9fc254fed74e68c655ffb0fc07061138862781e03e58e37d94b768d02e2feb96cea1785dd93f36454beb2e14c43e0e0d09fb8406525668415ce68012e96fe835b8d411076b430d105c5eceb86049d4fe52e526fcee81454e98780cb0777f4dac1a70e2a94422ab9717683d7e9f52c6b232a225a722966592f323abd537f8e46cebdfd65caa54f9cea88696c493544b3b3dcb25ef92b365838060015e52abe37472eda2adfd3c2ad6e193b8ed823c83def896d16993e708dd9aed3fc304b34b2d511229843572eaa4c7cc", 0xdb}, {&(0x7f0000000440)="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", 0xfb}, {&(0x7f0000000580)="3c13beee40700a13ff5ff842ea1f000c8da6497d293a423891a9230ed6c05f060ce0011fa7d1f8e14a0890d8ecf17300858c35dace8145f8df08e182a29d79660189902db5b5944920763a06f3ed7e3bf066df755ca3d3ad2224931519b99e741d3bcfd30d717a5f89d61882d3584bea01384059821da3624d9e8a18a0dfee02084716e6812e1757579766c8a5f952f4d3431b18f411104adf1f0f047b434fc7e25e45801787eac1d7c83bf835bfdcb8a24530c0be411e4c6d1205eaaeb7437078c9a9d810bc023643dcf5455d1b9c46d706eb83add5282e4047a5d5342adb6b939f0fe76bc480a1afd21a04363c26407d641db6d27427", 0xf7}], 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="80000000000000002900000036000000670c000000000000013f7ff3a0252693de070000000000000067bd5358c7ea70b5c59fe2f184bbf45f31cb450ea68e37c1bd59b8c475919574a5de863366b980aa6183c21014d3655204010207200000000306f7f40009000000000000000000010000000000040000000000000000001400000000000000290000004300000026020000000000001400000000000000ff000000430000005a0000000000000024000000000000002900000032000000fc0200"/208, @ANYRES32=0x0, @ANYBLOB="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"], 0x1f8}, 0x20000001) 07:18:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x31, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:18:16 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x0, 0x1) truncate(&(0x7f0000003200)='./file1\x00', 0x3) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x84000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r7}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r7, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x80}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008800}, 0x4c884) 07:18:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x4, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:18:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x5, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:18:16 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x300, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:16 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x134, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 2077.762618] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2077.797557] attempt to access beyond end of device [ 2077.797557] loop4: rw=2049, want=148, limit=14 [ 2077.806319] attempt to access beyond end of device [ 2077.806319] loop4: rw=34817, want=24, limit=14 [ 2077.837099] attempt to access beyond end of device [ 2077.837099] loop5: rw=2049, want=148, limit=14 [ 2077.857940] attempt to access beyond end of device [ 2077.857940] loop4: rw=0, want=21, limit=14 [ 2077.891241] attempt to access beyond end of device [ 2077.891241] loop5: rw=34817, want=24, limit=14 07:18:16 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0xa00, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 2077.891878] attempt to access beyond end of device [ 2077.891878] loop5: rw=0, want=21, limit=14 07:18:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x6, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:18:16 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x135, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x7, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 2078.207953] attempt to access beyond end of device [ 2078.207953] loop4: rw=34817, want=148, limit=14 [ 2078.209064] attempt to access beyond end of device [ 2078.209064] loop4: rw=34817, want=24, limit=14 [ 2078.211285] attempt to access beyond end of device [ 2078.211285] loop5: rw=34817, want=148, limit=14 [ 2078.261135] attempt to access beyond end of device [ 2078.261135] loop4: rw=0, want=21, limit=14 07:18:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x34, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:18:31 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x136, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:31 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_complete(0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0xc0182101, &(0x7f0000000440)={r3}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000100)={r3, 0x0, r4, 0xfffffffe}) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x2) io_setup(0x3e7, &(0x7f0000000580)=0x0) io_submit(r6, 0x1, &(0x7f0000000a40)=[&(0x7f0000000080)={0x4004800, 0x500, 0x0, 0x0, 0x0, r5, 0x0}]) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) 07:18:31 executing program 5: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x200000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x4, 0x5, &(0x7f0000000640)=[{&(0x7f0000000280)="f570766356eb171b6d86f98be67512b37a5a3031367afda1da8d65ef4aa6985c02ef7fe023ebf6c4c32a95f8730e787cbd59118fca5bfaea8fe20fe90380bad993d3159280d73cb179c9e7d6a54f1dd7f62ae8716ec25df5285cf5ec958a61ca97f5acd2ecf17013f5c601e98791e77ff5d64af0fb26c0e2fd3f57ab69b04414a5236549aaffa4a56d0d85e1397ebb8c3ff6422a500dcbff625a2770820218db2cbeea97dedfb3796310751d", 0xac}, {&(0x7f0000000340)="476b28c2cc3a9e298591854d4eeff97608c0b5e78c4960095af624dadac35f9d9ff4da1cfd60dd35c64479c8d5f4860f16a4195adae0b09433d97859cd65748901a8332ec98abd3c64af67a38a82e8bd6a0b5226e4dd834543606ab7d0e5434316407c4250ad29bfe8c4e341313901789a1cf447c53b3d08afc7e1e6a7c20574772041b2676958732de424c1b0f7b768efd0a19226325fb8b03e59fa7c4aab97e67dc960c43ccec5882b9ab30c80e9f10dbf4935c980c9b329f89d1e6e8d92d823f07fcb9c595a15d82ca66626c7939a45503e520619933dbbc6bb1f28f567b2f183", 0xe2, 0x5546}, {&(0x7f0000000440)="7b807630d9508a72f4b4731368c6cdee6423085430b3376c708ae3f7ec7311b50e4ec4f7fc101764bdecd9c1c75ee1985010b64e668b1fb7093d00ca1044cb5ec4a161ac5dfd2b809d347a249e49db31c10e24790bca9f132492232ab4aa31a515e3a402a52c40ae76ac02b74e3044ff058b824700a3beb92ec8b57b7746e171441785f080d6b3b9342c73c83a78e2", 0x8f, 0x100}, {&(0x7f0000000500)="3caecef317b3c6b0ec3901db96ca64a8b7c410934c933633d3222b123cfa5b532542c216c5af06f0ecc00fedd295e5ce4a3659abfd3d4e2e66b11a2888bcea1056e5b8fed090fa205e0d73fb0ee7448ec7ee5288e6a4232480d82265a04a29e1e8287d403b8095b3fb0bf933c8c0e9007834760e2840855db963f2e5f33646b3ceeaa1099dc99164e410f6f545a0c62c3371746a88d3f2068c593fc01ebcf214a4149843720c7386bcb65a614d0b318dc48f1e3949cbd10b5507cbb1ba28fd8edac4a5fc27b72408f0aba50258bf4403239ab0590e9e671be1f72b102b67f87b4c9f32933d9c7e33f97c9342fde7", 0xee, 0x7ff}, {&(0x7f0000000600)="a5d1e2b779ca9dd414976af3b741034dd7a668f0bfb39282f79fd0e1a86c71802c", 0x21, 0xdd9}], 0x1012, &(0x7f00000006c0)={[{@size={'size', 0x3d, [0x38, 0x2d, 0x37, 0x36, 0x38, 0x35]}}, {@huge_within_size}, {@mode={'mode', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@subj_type}]}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000780), 0x200001, 0x0) copy_file_range(r3, &(0x7f0000000740)=0x4, r4, 0x0, 0x4, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r6, 0x0, r5, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) sendfile(r0, r7, &(0x7f0000000100)=0x400, 0x80000001) 07:18:31 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0xec0, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x12, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:18:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000001}, 0x6050}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:18:31 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000000100)='./file1\x00', 0x3) 07:18:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x1c, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:18:31 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x137, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:31 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0xf00, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:32 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r2, 0xa0) recvmmsg$unix(r2, &(0x7f0000002ac0)=[{{&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000280)=""/149, 0x95}], 0x1, &(0x7f0000000340)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x48}}, {{&(0x7f00000003c0), 0x6e, &(0x7f0000002580)=[{&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/66, 0x42}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/94, 0x5e}], 0x5}}, {{&(0x7f0000002600), 0x6e, &(0x7f00000027c0)=[{&(0x7f0000002680)=""/160, 0xa0}, {&(0x7f0000002740)=""/78, 0x4e}], 0x2, &(0x7f0000002800)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000002880)=""/5, 0x5}, {&(0x7f00000028c0)=""/192, 0xc0}, {&(0x7f0000002980)=""/72, 0x48}, {&(0x7f0000002a00)=""/81, 0x51}], 0x4}}], 0x4, 0x120, &(0x7f0000002bc0)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xe2) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:18:32 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000010000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:18:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x50, 0x5, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) [ 2093.470620] attempt to access beyond end of device [ 2093.470620] loop5: rw=2049, want=24, limit=14 [ 2093.493750] attempt to access beyond end of device [ 2093.493750] loop4: rw=2049, want=148, limit=14 [ 2093.496650] attempt to access beyond end of device [ 2093.496650] loop5: rw=2049, want=21, limit=14 [ 2093.505822] attempt to access beyond end of device [ 2093.505822] loop4: rw=34817, want=24, limit=14 07:18:32 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x138, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 2093.506825] attempt to access beyond end of device [ 2093.506825] loop4: rw=0, want=21, limit=14 [ 2093.537206] attempt to access beyond end of device [ 2093.537206] loop4: rw=34817, want=148, limit=14 [ 2093.541821] attempt to access beyond end of device [ 2093.541821] loop4: rw=34817, want=24, limit=14 [ 2093.546781] attempt to access beyond end of device [ 2093.546781] loop4: rw=0, want=21, limit=14 [ 2093.591535] attempt to access beyond end of device [ 2093.591535] loop5: rw=1, want=21, limit=14 [ 2093.756833] attempt to access beyond end of device [ 2093.756833] loop4: rw=2049, want=24, limit=14 07:18:32 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x1702, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:45 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x139, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:45 executing program 5: r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x6, 0x26}}}}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, @in_args={0x2}}, './file1\x00'}) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000300)) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r4, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:18:45 executing program 1: msgget$private(0x0, 0x2c7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) r0 = gettid() sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/21, 0x15}], 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)=""/89, 0x59}, {&(0x7f0000000300)=""/214, 0xd6}], 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',^ersion=902000,access=any,\x00']) 07:18:45 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x1f00, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x35, 0x1e, 0x1b9, &(0x7f0000000200)}) 07:18:45 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x9, 0x1e, 0x1b9, &(0x7f0000000200)}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg$unix(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/53, 0x35}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/252, 0xfc}, {&(0x7f0000000600)=""/164, 0xa4}], 0x4, &(0x7f0000000700)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb0}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/90, 0x5a}, {&(0x7f0000000840)=""/29, 0x1d}, {&(0x7f0000000880)=""/7, 0x7}], 0x3, &(0x7f0000000900)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}}], 0x2, 0x40002100, &(0x7f0000000a00)={0x0, 0x3938700}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000a40)={'\x00', 0x5, 0x8, 0x1, 0x6, 0x800, r2}) 07:18:45 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x4000000010000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = dup(r0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r4, 0xa0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000100)={0x80000002}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r2, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:18:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x7, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:18:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x8, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:18:45 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x13a, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:45 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0x8100, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:45 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0xb4, 0x0, 0x5f59604ee39844ba, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0x7c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x8080}, 0x4004014) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000040)={0x8feeb78f7f657268, 0x80, 0x5, 0x40, 0x9, 0x1f, 0x0, 0x3, 0x1c283, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xe2, 0x4, @perf_config_ext={0x3, 0x4}, 0x1010, 0xe8b5, 0x0, 0x1, 0xffffffffffffffff, 0x6, 0xed3b, 0x0, 0xfffffffc, 0x0, 0x8}, r1, 0xe, 0xffffffffffffffff, 0x0) unshare(0x48020200) 07:18:45 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x13b, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:45 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000400f801", 0x17}, {0x0, 0x0, 0xeef}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) fchmod(r0, 0xa0) fspick(r0, &(0x7f0000000180)='./file1\x00', 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x4000000010000, 0x0) uselib(&(0x7f0000000100)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x800, 0x0) truncate(&(0x7f0000003200)='./file1\x00', 0x3) 07:18:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000018c0)={0x64, r1, 0x423, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x12, @dev}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x64}}, 0x0) 07:18:45 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0xc00e, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 2107.210027] handle_bad_sector: 2 callbacks suppressed [ 2107.210045] attempt to access beyond end of device [ 2107.210045] loop5: rw=2049, want=148, limit=14 [ 2107.213892] attempt to access beyond end of device [ 2107.213892] loop5: rw=34817, want=24, limit=14 [ 2107.215685] attempt to access beyond end of device [ 2107.215685] loop5: rw=0, want=21, limit=14 [ 2107.263750] attempt to access beyond end of device [ 2107.263750] loop5: rw=34817, want=148, limit=14 [ 2107.266988] attempt to access beyond end of device [ 2107.266988] loop5: rw=34817, want=24, limit=14 [ 2107.267592] attempt to access beyond end of device [ 2107.267592] loop5: rw=0, want=21, limit=14 [ 2107.275589] attempt to access beyond end of device [ 2107.275589] loop4: rw=2049, want=148, limit=14 [ 2107.341150] attempt to access beyond end of device [ 2107.341150] loop4: rw=34817, want=24, limit=14 [ 2107.343076] attempt to access beyond end of device [ 2107.343076] loop4: rw=0, want=21, limit=14 07:18:46 executing program 6: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x210000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x13c, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 07:18:46 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x1a, 0x101, 0x0, 0xf000, {}, [@generic]}, 0x14}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_script(r1, 0x0, 0x1030) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 2107.629205] attempt to access beyond end of device [ 2107.629205] loop5: rw=2049, want=148, limit=14 BUG: leak checking failed VM DIAGNOSIS: 07:18:46 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000001 RCX=1ffff110010a3f23 RDX=1ffff110010a3f1b RSI=ffff88800851fe48 RDI=ffff88800851fe48 RBP=ffff88800851f90d RSP=ffff88800851f800 R8 =0000000000000001 R9 =0000000000000001 R10=0000000000032042 R11=1ffff110010a3f08 R12=ffff88800851fe78 R13=ffff88800851f8d8 R14=1ffff110010a3f08 R15=ffffffff85d303c4 RIP=ffffffff81108ffa RFL=00000216 [----AP-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005555559bbc98 CR3=000000000e782000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=00000000000000d1000000302f716d2f XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=0000557be1cbbf500000557be1cbbf30 XMM06=0000557be1cdc570ffffffff00000002 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=fffffbfff0ace191 RBX=fffffbfff0ace192 RCX=ffffffff8126f85f RDX=fffffbfff0ace192 RSI=0000000000000008 RDI=ffffffff85670c88 RBP=fffffbfff0ace191 RSP=ffff88806cf09d50 R8 =0000000000000000 R9 =ffffffff85670c8f R10=fffffbfff0ace191 R11=0000000000000001 R12=ffffffff85000358 R13=0000000000000202 R14=0000000000052a7d R15=0000000000000009 RIP=ffffffff816bcb48 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555556b80c98 CR3=000000000e928000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000415c6f9200000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000